BruCON 2022 Training

Immerse yourself into the world of security by attending the BruCON Training ! BruCON offers world-class, deep-technical training given by the most recognised experts with huge industry experience in their domain. We want to offer courses for anybody interesting in security, ranging from novice to advanced and for red and blue teams !

Spring Training

BruCON 0x0E Spring Training will take place between the 20th until 22nd of April 2022. Depending on the courses these will be hosted virtually or will be hosted at the Novotel Mechelen Centre (here) on the same dates.

Description: The Corelan “BOOTCAMP” is a truly unique opportunity to learn both basic & advanced techniques from an experienced exploit developer. During this 3 “long” days, students will be able to learn all ins and outs about writing reliable stack based exploits for the Windows platform.  The trainer will share his “notes from the field” and various tips & tricks to become more effective at writing exploits. We believe it is important to start the course by explaining the basics of stack buffer overflows and exploit writing, but this is most certainly not “your average” entry level course. In fact, this is a true bootcamp and one of the finest and most advanced courses you will find on Win32 stack based exploit development.

Instructor: Peter Van Eeckhoutte

Duration: 3-day course

Read More

Description: This course provides a comprehensive picture of a Cyber Security Operations Center (CSOC or SOC). Discussion on the technology needed to run a SOC are handled in a vendor agnostic way. In addition, technology is addressed in a way that attempts to address both minimal budgets as well as budgets with global scope. Staff roles needed are enumerated. Informing and training staff through internal training and information sharing is addressed. The interaction between functional areas and data exchanged is detailed. Processes to coordinate the technology, the SOC staff, and the business are enumerated.

After attending this class, the participant will have a roadmap (and Gantt chart) for what needs to be done in the organization seeking to implement security operations. Ideally, attendees will be  SOC managers, team leads in security specializations or lead technical staff, security architects. CIO, CISO or CSO (Chief Security Officer) is the highest level in the organization appropriate to  attend.

Instructor: Christopher Crowley

Duration: 3-day

Read More

Description: This is a hands-on IoT hacking class. It covers all aspects of IoT Security, from the technologies and testing methodologies to the vulnerabilities. The main focus is offensive security: attacking and testing the devices and platforms. We first cover the basics and lay out the ground with concepts before diving into the actual hacking. This provides the understanding of what and why the things can be hacked, with a good mix of knowledge and learning-by-doing or in this case learning-by-hacking.

Students will receive a IoT Hacking Kit (hardware with a value of +300 Euros), which contains the tools and some vulnerable devices used in class, so that they can continue sharpening their skills or hack devices after the event.

Instructor: Pablo Endres

Duration: 3-day

Read More

Description:Enterprises are managed using Active Directory (AD) and it often forms the backbone of the complete enterprise network. Therefore, to secure an enterprise from an adversary, it is inevitable to secure its AD environment. To secure AD, you must understand different techniques and attacks used by adversaries against it. Often burdened with maintaining backward compatibility and interoperability with a variety of products, AD environments lack ability to tackle latest threats.

This training is aimed towards attacking modern AD Environment using built-in tools like PowerShell and other trusted OS resources. The training is based on real world penetration tests and Red Team engagements for highly secured environments.

Instructor: Nikhil Mittal

Duration: 3-day

Read More

Description: Updated for 2022, our immersive 2-day Defending Enterprises training is the natural counterpart to  our popular Hacking Enterprises course. From SIEM configuration oversight to monitoring, alerting and threat hunting, you’ll play a SOC  analyst in our Microsoft Sentinel cloud-based lab and try to rapidly locate IOA’s and IOC’s from an  enterprise breach executed by the trainers.

Whether you’re new to Kusto Query Language (KQL) or a seasoned pro, there’s plenty for you in the  2-days! Yes, we’re using Microsoft Sentinel, but the underlying threat detection theory, logic and threat hunting approach is transferable into your own environments, whatever your preferred  platform is.

We look at the top 10 methods we use in offensive engagements and show how these can be caught,  along with numerous other examples and methods that go above and beyond these common TTPs!

Instructor: Owen Shearing / Will Hunt

Duration: 2-day (Starting Thursday 21st of April)

Read More

Description: This 3-day course cuts through the mystery of Cloud Services (including AWS, Azure and G-Cloud) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both what makes them different, and what makes them the same, as compared to hacking and securing a traditional network infrastructure. Whether you are an Architect, Developer, Pentester, Security or DevOps Engineer, or anyone with a need to understand and manage vulnerabilities in a Cloud environment, understanding relevant hacking techniques, and how to protect yourself from them, is critical.

This class covers both the theory a well as a number of modern techniques that may be used to compromise various Cloud services and infrastructure

Instructor: Anthony Webb

Duration: 3-day

Read More

Description: Fuzzing is a technique of identifying software vulnerabilities by automated corpus generation. It has produced immense results and attracted a lot of visibility from security researchers and professionals in the industry, today fuzzing can be utilized in various ways which can be incorporated into your secure SDLC to discover vulnerabilities in advance and fix them.

Finding vulnerabilities in software requires in-depth knowledge of different technology stacks. Modern day software’s have a huge codebase and may contain vulnerabilities. Manually verifying such vulnerabilities is a tedious task and may not be possible in all cases. This training is designed in such a way that it introduces the concept of fuzzing and vulnerability discovery in software’s covering multiple platforms such as Linux & Windows and triage analysis for those vulnerabilities.

During this training, attendees would be emulating techniques which would provide a comprehensive understanding of “Crash, Detect & Triage” of fuzzed binaries or software. In “Deep dive into fuzzing” we will be covering a detailed overview of fuzzing and how it can be beneficial to professionals in uncovering security vulnerabilities with a hands-on approach through focus on labs.

Instructor: Dhiraj Mishra / Zubin Devnani

Duration: 2-day (Starting Thursday 21st of April)

Read More



Corelan “Bootcamp” – stack exploitation – Peter Van Eeckhoutte 3-days In-person
IoT Security Bootcamp – Pablo Endres 3-days In-person
Active Directory attacks for Red and Blue Teams – Advanced Edition – Nikhil Mittal 3-days Virtual
Defending Enterprises – 2022 Edition – Will Hunt and Owen Shearing 2-days In-person
Hacking and Securing Cloud Infrastructure – Anthony Webb 3-days In-person
SOC-Class – Christopher Crowley 3-days Virtual
Deep Dive into Fuzzing – Dhiraj Mishra and Zubin Devnani 2-days Virtual

Additional info


The price for 2-day courses is 1300 Euro early bird (+ VAT) per attendee.
The price for 3-day courses is 1600 Euro early bird (+ VAT) per attendee.

As of the 15th of February this will become 1400 Euro (2-day) / 1700 Euro (3-day) (+ VAT) per attendee.

(*) The Corelan trainings are a little bit more expensive but consist of 3 long days (+ 10 hours) including dinner.

(**) The IoT Security Bootcamp  is a bit more expensive but each student will be provided with your own IoT Security Hacking Kit to take home with you

Location and dates

In-person courses will be hosted at the Novotel Mechelen Centre (here). The virtual courses will be handled through Zoom, and a class room will be foresoon in either of the pre-mentioned hotels for people wanting to together. See below for more information

The courses begin promptly at 09h00 and end at 17h00 (CET) (Except Corelan trainings). Out of consideration for your instructor(s) and fellow students, please try to be seated (or joined the Zoom conference) and ready to go by 08h45.

Why attend a BruCON Training ?

At BruCON, we try to keep our prices affordable, both for the conference and training. We focus on the having smaller classes with enough time to get to learn and exchange experience. We will host a social gathering for students, trainers and crew to meetup over a beer (or more).

Same price for virtual and in-person training ?

At BruCON we try to keep training affordable whilst making it profitable for our trainers. We will have a hybrid situation, whereby we will have on-site and virtual courses and whereby you can opt to attend the latter in a classroom with fellow students. To allow for most flexibility, we decided to have the same price for both in-person and virtual courses and people who do not attend a virtual course in-person will be shipped a complementary gift from BruCON.

Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.