Choose your tickets
BSidesROC Training @ RIT ESL Global Cybersecurity Institute
Open Source 5G Network Deployment ticket
8:00 a.m. - Noon Instructor: Andrew Fox In the networking industry, there is a lack of tools and software that provide a testing platform to experiment with mobile networks. Without these platforms to experiment with, researchers can only present concepts for changes to mobile networks and cannot prove their work is practical. Open AI Cellular (OAIC) provides the software and tools to install, deploy, and configure a 5G network. OAIC is a 5G network research and experimentation platform where researchers can learn more about mobile networks with simulated equipment that matches today’s networking standards. You will learn more about the core components needed to create a 5G network and experiment with a wireless mobile network. Requirements: Laptop with latest version of Ubuntu installed or a laptop that can run a virtual machine with Ubuntu. Specific classroom details will be sent to ticket holders prior to the training. ***Please note that a training ticket does not include a conference ticket. Please purchase a conference ticket if you are attending the conference on Saturday, March 22, 2025.
8:00 a.m. - Noon Instructor: Andrew Fox In the networking industry, there is a lack of tools and software that provide a testing platform to experiment with mobile networks. Without these platforms to experiment with, researchers can only present concepts for changes to mobile networks and cannot prove their work is practical. Open AI Cellular (OAIC) provides the software and tools to install, deploy, and configure a 5G network. OAIC is a 5G network research and experimentation platform where researchers can learn more about mobile networks with simulated equipment that matches today’s networking standards. You will learn more about the core components needed to create a 5G network and experiment with a wireless mobile network. Requirements: Laptop with latest version of Ubuntu installed or a laptop that can run a virtual machine with Ubuntu. Specific classroom details will be sent to ticket holders prior to the training. ***Please note that a training ticket does not include a conference ticket. Please purchase a conference ticket if you are attending the conference on Saturday, March 22, 2025.
$50.00+ $3.24 feeA Bug Hunters Way of Assessing Web Application Security ticket
8:00am - Noon Instructor: Saurabh Singh This session will delve into the step-by-step methodology employed by bug hunters and penetration testers to assess the security of web applications. By focusing on practical techniques and tools, the talk will empower attendees with actionable knowledge to find vulnerabilities and enhance the overall security of their applications. The session will focus on how to use the tools in real applications to find security issues in real-time with few live targets and vulnerable machines. This session also focuses on understanding multiple types of attack vectors on a single vulnerability from OWASP, SANS and Business logic flaws. Requirements: Laptop Specific classroom details will be sent to ticket holders prior to the training. ***Please note that a training ticket does not include a conference ticket. Please purchase a conference ticket if you are attending the conference on Saturday, March 22, 2025.
8:00am - Noon Instructor: Saurabh Singh This session will delve into the step-by-step methodology employed by bug hunters and penetration testers to assess the security of web applications. By focusing on practical techniques and tools, the talk will empower attendees with actionable knowledge to find vulnerabilities and enhance the overall security of their applications. The session will focus on how to use the tools in real applications to find security issues in real-time with few live targets and vulnerable machines. This session also focuses on understanding multiple types of attack vectors on a single vulnerability from OWASP, SANS and Business logic flaws. Requirements: Laptop Specific classroom details will be sent to ticket holders prior to the training. ***Please note that a training ticket does not include a conference ticket. Please purchase a conference ticket if you are attending the conference on Saturday, March 22, 2025.
$50.00+ $3.24 feeIntroduction to Computer Forensics ticket
8:00am to 5:00pm Instructor: Tyler Hudak Computer forensics and investigation skills have become a top priority for many organizations. As cyber threats continue to grow in complexity, organizations need skilled professionals who can analyze digital evidence, uncover malicious activity, and respond to security incidents effectively. This course teaches students the skills to analyze core Windows forensics artifacts, enabling them to help their organization combat ongoing cybersecurity threats. Requirements: Laptop Specific classroom details will be sent to ticket holders prior to the training. ***Please note that a training ticket does not include a conference ticket. Please purchase a conference ticket if you are attending the conference on Saturday, March 22, 2025.
8:00am to 5:00pm Instructor: Tyler Hudak Computer forensics and investigation skills have become a top priority for many organizations. As cyber threats continue to grow in complexity, organizations need skilled professionals who can analyze digital evidence, uncover malicious activity, and respond to security incidents effectively. This course teaches students the skills to analyze core Windows forensics artifacts, enabling them to help their organization combat ongoing cybersecurity threats. Requirements: Laptop Specific classroom details will be sent to ticket holders prior to the training. ***Please note that a training ticket does not include a conference ticket. Please purchase a conference ticket if you are attending the conference on Saturday, March 22, 2025.
$50.00+ $3.24 fee