LayerOne 2018 Information Security Conference

May 25, 2018

May 27, 2018

10:00 To 18:00

Hilton Pasadena, South Los Robles Avenue, Pasadena, CA, USA


Event Description

LayerOne is a computer security conference located in Los Angeles, California. Since 2004, we’ve featured speakers from all across the globe and on topics ranging from lockpicking and MPLS security to covert data gathering and HIPAA compliance. Our speakers come from a diverse background and include a focus not just on the nuts and bolts of technology but the social impact as well.

One of the defining features of LayerOne is the overwhelming amount of hands-on workshops, events, and contests available to all attendees. From electronics to lock picking to no-holds-barred hacking competitions, LayerOne has something for everyone to learn more and enjoy themselves throughout the conference.

LayerOne 2018 will be held on May 25-27, 2018. For full event information visit Training information is available at

2018 Training Roster:

Hands-on Penetration Testing and Ethical Hacking
Presented By: Geoffrey Janjua

This hands-on focused course is designed to get you started with penetration testing with guidance from a full-time penetration tester with 20+ years of technical experience. Covering the phases of exploitation, real-world attack strategies, effective use of Metasploit, and privilege escalation techniques. This course is a “must have” for anyone who is ready to jump start their career in penetration testing. Each student will receive a take home exploitation lab with 10 vulnerable targets to practice on, printed materials, cheatsheets, compiled exploits, and walkthroughs for each target.

Let’s Be Bad Guys: Advanced Post-Exploitation and Blue Team Evasion
Presented By: Dan Tentler

This course is designed to up your quiet game. In the recent years, blue teams have grown complacent with new tools and telemetry. They don’t actively hunt unless a tool tells them a box is interesting. In this course, you will learn how to tunnel your comms, stand up C2 infrastructure to be misleading, encrypt you traffic, create diversions, and other escape and evasion techniques to hide from the blue team. This course focuses on hiding on the network as well as in the system. Both Linux and Windows operating systems will be targeted for this course.

Hands-on DevOps Security and AppSec Automation
Presented By: Abhay Bhargav

Application Security is a critical piece of the DevOps puzzle. However, it is severely under-represented in the Continuous Delivery pipeline. Practitioners and Organizations run into problems with Application Security testing in the continuous delivery pipeline, often relying on very basic security tests to provide Application Security Assurance in the Continuous Delivery Pipeline. You need a practical, repeatable and scalable way to deliver Application Security to your product across the Agile and DevOps lifecycle. In this workshop you will receive powerful hands on training on how you can implement scalable and effective security for rapid-release applications.

OpenSOC Network Defense Simulation
Presented By: Eric Capuano

OpenSOC is a challenge meant to teach infosec professionals practical incident response skills in an environment that very closely resembles a real enterprise network. The virtual environment includes a scaled down version of almost everything you would find in an enterprise network to include workstations, servers, firewalls, email, web browsing, user activity, etc. Simulated users are actually browsing the Internet, downloading files, watching videos, and accessing LAN resources. This creates a high fidelity training environment for unleashing real-world attacks and testing a responder’s ability to filter out the noise and find malicious activity on the network.

Android Reverse Engineering for Bug Bounties and Vulnerability Hunting
Presented By: Ben Actis

This hands-on training course is designed to form the foundation for reverse engineering Android applications. Taught by a veteran Mobile & IoT security expert, students will leave the class being able to identify common inner process communication mistakes, insecure storage calls, intercept & modify mobile traffic, insecure crypto & web activity invocations, core constructs of dalvik/smali assembly language and basic debugging capabilities. Anyone interested in bug bounties, mobile reversing or developers interested in how others would attack their mobile applications should take this course!


How to Register?

Register at

Visited 263 times, 1 Visit today

Add a Review

You must be logged in to post a comment.

Related Event

Atlanta, GA, USA

August 29, 2019

9:00 am To 5:00 pm

Price is US Dollars. This is a ONE-DAY seminar for Managers, Senior Managers, Executives and Board of Directors across all industries. Lunch, refreshments and snacks are included. Please contact us with special meal requirements. Read more…

February 25, 2019 To March 2, 2019

9:00 am To 6:00 pm

Develop much-needed skills to protect against today’s cyber-attacks. Join us for SANS Reno Tahoe 2019 (February 25-March 2), and get hands-on training needed to sharpen your skills and accelerate your cyber security career. Read more…

Seattle, WA, USA

June 11, 2019 To June 13, 2019

9:00 am To 5:00 pm

Price is US Dollars. This is a THREE-DAY immersion boot camp for members of the CISO organization and its key stakeholders across all industries. Lunch, refreshments and snacks are included.  Please contact us with special meal requirements. Read more…