Join the intensive instructor-led training programs hosted by our Strategic Partner Byt3con. Each training features hands-on labs, real-world scenarios, and expert mentorship delivered onsite.
VULNCON 2026
BYT3CON Trainings

Take your web application pen-testing skills to the next level with this intermediate-level training course tailored for professional pen testers, bug hunters, and security enthusiasts. Rooted in the principles of the OWASP Testing Guide, this comprehensive course equips you with a structured and practical approach to uncovering vulnerabilities. By mapping workflows, understanding web application components, and utilizing open-source tools, you'll sharpen your ability to identify critical bugs with precision and efficiency. Designed for those actively engaged in pentest projects, this training is your key to becoming a more proficient and impactful web application

Dhruv Shah
Instructor
Level
Intermediate
In 2026, one lesson is clear: software supply chain attacks are some of the hardest threats to understand and some of the easiest for attackers to exploit. Threat actors are not just attacking the perimeter. They are going after developers, automation, and the software delivery lifecycle itself. From Shai Hulud and npm worms to poisoned packages, malicious IDE plugins, and build hijacks, recent attacks have proven that a single compromised dependency can move through trusted pipelines straight into production. Developer laptops, source repos, CI runners, containers, and clusters now operate as one ecosystem, where everything is a connected attack surface.

Anant Shrivastava
Instructor
Level
Intermediate
Modern cloud attacks rarely rely on obscure tricks. Most compromises come from exposed services, weak trust boundaries, over-privileged identities, insecure workload design, metadata access, and poor separation between application and cloud control layers. This hands-on course teaches students to identify and exploit these patterns in AWS and Google Cloud through realistic labs. Focusing only on AWS and GCP, the training emphasizes depth over breadth. Students deploy vulnerable environments with Terraform and work through attack chains involving storage exposure, SSRF, IAM abuse, secret extraction, GKE footholds, and service account misuse, with structured debriefs on prevention, detection, and containment.

Anant Shrivastava
Instructor
Level
Intermediate
Cutting-edge 100% hands-on training on attacking AI systems, models, and native applications. Master prompt injection, supply chain exploitation, model poisoning, MCP protocol attacks, and multi-agent system compromise through real-world exercises.

Anirudh Anand & Hritik Vijay
Instructor
Level
Intermediate
Master red teaming techniques targeting Active Directory and Azure Entra ID in hybrid environments. Learn to exploit misconfigurations, perform lateral movement between on-premise and cloud, achieve persistence, and execute full-spectrum adversary simulation. Includes hybrid lab access from Day 1.

Yash Bharadwaj & Manish Gupta
Instructor
Level
Expert
This three-day hands-on training equips cybersecurity professionals with skills to collect, analyze, automate, and operationalize Cyber Threat Intelligence (CTI). Progress from foundational concepts to advanced threat hunting and intelligence integration, ensuring deep understanding of CTI frameworks, adversary tactics, OSINT techniques, automation, and various intelligence sources like malware and darknet.

Darshit Ashara & Rahul Binjve
Instructor
Level
Intermediate

Bundle your 3-Day Byt3con Training with a Vulncon 2026 Conference Pass
Register Now