Security Fest 2025 is proud to present two training sessions,held by the good people from in.security!
Here you'll find necessary information about the trainings.
This information was updated 2025-02-03.
in.security is a UK-based company that specialises in delivering high-quality, hands-on training in the field of cybersecurity. Their trainers are experienced professionals who have worked in a variety of roles within the industry.
Will (@Stealthsploit) has been in infosec for over 15 years, co-founded In.security in 2018 and as a pentester has helped secure many organisations through technical security services and training. Will's delivered hacking courses globally at several conferences including Black Hat, has spoken at several conferences and events and helps run Password Village at DEFCON. Will also assists the UK government in various technical, educational and advisory capacities. Before Will was a security consultant he was an experienced digital forensics consultant and trainer.
Owen (@rebootuser) is a co-founder of In.security, a specialist cyber security consultancy offering technical and training services based in the UK. He has a strong background in networking and IT infrastructure, with well over two decades of experience in technical security roles. Owen has provided technical training to a variety of audiences at bespoke events as well as Black Hat, Wild West Hackin' Fest, NolaCon, 44CON, TROOPERS, BruCON and Hack in Paris. He keeps projects at github.com/rebootuser.
Both trainings will be held on June 2-3, 2025, near the main venue of Security Fest in Gothenburg, Sweden.
Purchasing a training ticket will also give you access to the conference on June 4-5, 2025.
Also included in the training ticket price is a light breakfast, lunch and coffee/tea breaks (fika) during the training days.
Training Ticket price: 20 000 SEK (excl. VAT)
(early bird price for the first few tickets sold: 16 000 SEK)
Duration: 2 days
Our 2025 revision is a major update — a new lab built from the ground up with new and exciting content! Hacking Enterprises is the natural counterpart to our popular Defending Enterprises course.
In this multi-layered offensive engagement, you will fully compromise a simulated enterprise in this immersive hands-on course that covers a multitude of TTP's. Using modern techniques and focusing on exploiting configuration weaknesses rather than throwing traditional exploits, your logical thinking and creativity will definitely be put to the test!
During this realistic threat emulation, you'll perform OSINT reconnaissance to identify initial access vectors for a fictional organisation. Later, you'll phish your way in where you'll identify multiple networks, some easily accessible, others not so. Targeting modern operating systems including Windows Server 2025 within an enterprise VDI environment, you'll implant and establish C2, but manual techniques will always be emphasised so you're equipped with the knowledge to work without reliance on frameworks.
With real-world challenges, you'll perform hands-on exercises including exploitative phishing against simulated users, tackle IPv6, perform proxying, pivoting and tunnelling, subvert AMSI, AV and AWL, credential harvesting, passphrase cracking, lateral movement, MSSQL and ADCS abuse, abusing domain trusts, performing Microsoft Azure attacks, persistence and much more!
We know 2 days isn't a lot of time, so you'll also get 14-days FREE lab time after class, Discord access for support and access to a post-training CTF containing hosts and networks not seen during training!
Day 1
Day 2
We realise that training courses are limited for time and therefore students are also provided with the following:
This training is suited to a variety of students, including:
Non-technical individuals would not be suited to this course and anyone who is not comfortable at a Linux/Windows command line.
Duration: 2 days
Updated for 2025, our immersive 2-day Defending Enterprises training is the natural counterpart to our popular Hacking Enterprises course.
You'll play a SOC analyst in our Microsoft Sentinel cloud-based lab and try to rapidly locate IOA's and IOC's from a live enterprise breach executed by the trainers in real time.
Whether you're new to Kusto Query Language (KQL) or a seasoned pro, there's plenty for you in the 2-days! Yes, we're using Microsoft Sentinel, but the underlying threat detection theory, logic and threat hunting approach is transferable into your own environments, whatever your preferred platform.
We look at the top 10+ methods we use in offensive engagements and show how these can be caught, along with numerous other examples and methods that go above and beyond these common TTPs!
This training goes beyond threat hunting as we peek into the world of detection engineering and the processes involved in converting logic into alerts!
With 14 hands-on exercises, many of which also featuring extra time and bonus content, you'll gain real-world experience in the following areas:
Day 1
Day 2
We realise that training courses are limited for time and therefore students are also provided with the following:
This training is suited to a variety of students, including:
Non-technical individuals would not be suited to this course.
Detection methods will be taught during training, however an understanding of KQL concepts would be beneficial, and previous SOC experience and/or pentesting is advantageous but not required.
We're honoured to have some amazing renowned speakers from all over the world, in two great conference days! Learn. Inspire. Connect.
The Security Fest conference is held in Gothenburg, on the west coast of Sweden, in the beginning of summer: a perfect time to visit Sweden!
There's plenty of time to meet and talk to the speakers and the other conference attendees! There's a awesome party on Thursday evening!
Security Fest is held in Elite Park Avenue Hotel in Gothenburg.