Vulncon’s Strategic Partnership

BYT3CON
Trainings

Join the intensive instructor-led training programs hosted by our Strategic Partner Byt3con. Each training features hands-on labs, real-world scenarios, and expert mentorship delivered onsite.

VULNCON 2026

12 - 13 June 2026NIMHANS Convention Centre, Bangalore

BYT3CON Trainings

15 - 17 June 2026Hotel Royal Orchid, Bangalore
Vulncon x Byt3con

Trainings By our Strategic Partner — Byt3con

PentestingWeb HackingOffensiveDefensive

HackTheWeb: Pentesting Beyond Basics

Take your web application pen-testing skills to the next level with this intermediate-level training course tailored for professional pen testers, bug hunters, and security enthusiasts. Rooted in the principles of the OWASP Testing Guide, this comprehensive course equips you with a structured and practical approach to uncovering vulnerabilities. By mapping workflows, understanding web application components, and utilizing open-source tools, you'll sharpen your ability to identify critical bugs with precision and efficiency. Designed for those actively engaged in pentest projects, this training is your key to becoming a more proficient and impactful web application

Dhruv Shah

Instructor

Level

Intermediate

View Curriculum
Supply Chain SecurityDevSecOpsOffensiveDefensive

Attack and Defend Software Supply Chains

In 2026, one lesson is clear: software supply chain attacks are some of the hardest threats to understand and some of the easiest for attackers to exploit. Threat actors are not just attacking the perimeter. They are going after developers, automation, and the software delivery lifecycle itself. From Shai Hulud and npm worms to poisoned packages, malicious IDE plugins, and build hijacks, recent attacks have proven that a single compromised dependency can move through trusted pipelines straight into production. Developer laptops, source repos, CI runners, containers, and clusters now operate as one ecosystem, where everything is a connected attack surface.

Anant Shrivastava

Instructor

Level

Intermediate

View Curriculum
Cloud SecurityAWSGoogle CloudExploitation

HackTheCloud – Exploiting AWS and GCP for Fun and Profit

Modern cloud attacks rarely rely on obscure tricks. Most compromises come from exposed services, weak trust boundaries, over-privileged identities, insecure workload design, metadata access, and poor separation between application and cloud control layers. This hands-on course teaches students to identify and exploit these patterns in AWS and Google Cloud through realistic labs. Focusing only on AWS and GCP, the training emphasizes depth over breadth. Students deploy vulnerable environments with Terraform and work through attack chains involving storage exposure, SSRF, IAM abuse, secret extraction, GKE footholds, and service account misuse, with structured debriefs on prevention, detection, and containment.

Anant Shrivastava

Instructor

Level

Intermediate

View Curriculum
AI SecurityPrompt InjectionRed TeamingOffensive

Offensive AI: Attacking AI Native Apps, IDE's, & Browsers

Cutting-edge 100% hands-on training on attacking AI systems, models, and native applications. Master prompt injection, supply chain exploitation, model poisoning, MCP protocol attacks, and multi-agent system compromise through real-world exercises.

Anirudh Anand & Hritik Vijay

Instructor

Level

Intermediate

View Curriculum
Red TeamingActive DirectoryAzure Entra IDIdentity SecurityPenetration TestingCloud Security

Red Teaming Active Directory & Entra ID

Master red teaming techniques targeting Active Directory and Azure Entra ID in hybrid environments. Learn to exploit misconfigurations, perform lateral movement between on-premise and cloud, achieve persistence, and execute full-spectrum adversary simulation. Includes hybrid lab access from Day 1.

Yash Bharadwaj & Manish Gupta

Instructor

Level

Expert

View Curriculum
Threat IntelligenceOSINTCTIAutomationMalware AnalysisPython

Applied Cyber Threat Intelligence Bootcamp

This three-day hands-on training equips cybersecurity professionals with skills to collect, analyze, automate, and operationalize Cyber Threat Intelligence (CTI). Progress from foundational concepts to advanced threat hunting and intelligence integration, ensuring deep understanding of CTI frameworks, adversary tactics, OSINT techniques, automation, and various intelligence sources like malware and darknet.

Darshit Ashara & Rahul Binjve

Instructor

Level

Intermediate

View Curriculum
CTA Background

SAVE UP TO 20% WITH
EXCLUSIVE COMBO PASS

Bundle your 3-Day Byt3con Training with a Vulncon 2026 Conference Pass

Register Now