During this workshop, you will learn how to use the various tools from the
OpenSSH suite. We will start with a presentation of the problems that are solved
by OpenSSH, then we will dive into the details of its most important and useful
features.
Among the topics covered, we will discuss about remote host authentication,
password and public key client authentication, key generation, local and remote
port forwarding, forward and reverse SOCKS proxying, X11 forwarding, jumphosts, connection to legacy systems, and more.
Hands-on exercises will be proposed throughout the exploration of the tool suite
using real-life scenarios. There will be space for questions and discussion.
This workshop is intended for beginners who wants to improve their practical
knowledge and experience with OpenSSH.
Basic networking and Linux shell knowledge are required in order to follow this
workshop. Each participant will need a Linux machine (on which they have root access) with Docker pre-installed and Internet access.
Exploring OpenSSH: Hands-On Workshop for Beginners
During this workshop, you will learn how to use the various tools from theOpenSSH suite. We will start with a presentation of the problems that are solvedby OpenSSH, then we will dive into the details of its most important and usefulfeatures.Among the topics covered, we will discuss about remote host authentication,password and public key client authentication, key generation, local and remoteport forwarding, forward and reverse SOCKS proxying, X11 forwarding, jumphosts, connection to legacy systems, and more. Hands-on exercises will be proposed
Zeek and Destroy with Python and Machine Learning Workshop
Zeek is an open-source network security monitor (NSM) and analytics platform that has been around for quite some time (since the mid-90s). It is used at large university campuses and research labs, but in the past few years, more and more security professionals in the industry have turned their attention to this fantastic tool. But Zeek is so much more than just a NIDS generating alerts (notices) and log files! Zeek's scripting language allows security analysts to perform arbitrary analysis tasks
AI Security from First Principles
Learn to build, break and secure AI from first principles with this hands-on workshop; from neural nets to attack classes & AI model exploration. No AI/ML experience is needed, just basic Python & command-line skills. All code provided. Ideal for builders, breakers and defenders. Learn how to attack and defend AI. Who is it for?- For hands on builders, breakers, cyber risk and security, audit. What are the requirements?- Python: basic familiarity; install modules, import them, call functions, write simple conditionals and loops (note: you