2631759-The-Westin-San-Diego--Hotel-Exterior-14This year’s ToorCon San Diego is offering three exclusive 2-day hands-on training workshops focused on various aspects of computer security. The workshops will be taking place on October 22nd-23rd and include meals, hardware, and tools necessary to participate in the workshop (you just supply the laptop). We are also offering a discount when you register for both the workshops and the seminars. All workshops attendees get admission to the Conference. The workshops are being held at the Emerald Plaza Westin on the 3rd Floor Ivory Room, Pearl Room, and Coral Rooms. Our pricing schedule is listed below:

Cut Off Date Conference Price
Sept 5th $1000-$1550
Oct 19 $1250-$1550
At the Door $1650-$1950

Online Registration opens June 12, 2015. Check-in opens at 8:30AM Wednesday, October 21, 2015

Software Defined Radio Workshop
Instructor: Michael Ossmann, Great Scott Gadgets
Register: Workshop + Seminar

The two day Software Defined Radio (SDR) workshop at ToorCon is an introduction to digital signal processing, software radio, and the powerful tools that enable the growing array of SDR projects within the hacker community. This course takes a unique “software radio for hackers” approach, building on the participants’ knowledge of computer programming and introducing them to the forefront of digital radio technology. Participants will learn how to transmit, receive, and analyze radio signals and will be prepared to use this knowledge in the research of wireless communication security. See Syllabus…


MS-SQL Post-exploitation In-depth Workshop
Instructors: Rob Beck & Noelle Murata, Neohapsis
Register: Workshop + Seminar

The MS-SQL Post-exploitation In-depth workshop demonstrates the tactics an attacker can employ to maintain persistence in a Microsoft SQL Server database, while harnessing the available facilities to expand their influence in an environment. Plenty of resources exist today that show methods for compromising SQL and SQL-dependent applications to achieve access to the environment, very few provide methods for maintaining control of a SQL instances or performing attacks against the host and environment from within the SQL service.

This course will offer attendees an understanding of the various facilities that are available for executing system level commands, scripting, and compiling code… all from inside the SQL environment, once privileged access has been acquired. See Syllabus…