No matter where you're at, we've got something for you!
Researchers and industry professionals are invited to speak about their projects and experience at Cybersecurity Club (CSC).
Check out the calendar for more information about upcoming talks.
At CSC you can:
- Gain insight into the different concentrations within cyber security
- Connect with industry professionals
- Learn about relevant research efforts
- Learn about lab research projects
Recommended for all levels of experience
Mobile Security and Bug Bounties
Ken Gannon, MWR InfoSecurity
Applying Game Theory to Defensive Security
Kelly Shortridge , Security Scorecard
The Industry - Different Roles
Erik Cabetas, Include Security
Meltdown and Spectre Explained
Paul Kocher, Cryptography Research Inc
Capture the Flag are competitions where competitors can gain hands-on experience with offensive security through simulations of real world scenarios.
We welcome people of any skill level to come by and join us.
To learn more about CTF's, check this out.
Recommended for all skill levels
Recruit is a hands-on approach to learning about the basics of offensive security.
It consists of several challenges that demonstrate introductory concepts in a CTF-style format.
Newcomers are highly encouraged to drop by the OSIRIS lab at RH219 to ask for help.
Anyone can participate from anywhere at anytime, everything is online and hosted here.
Topics covered include:
- Web Security
- Reverse Engineering
- Post Exploitation
- Application Security
Some programming experience is recommended but not required
Hack Night is a series of workshops in advanced topics for those who are comfortable with basics and are looking to expand their skills.
Every workshop aims to expose the audience to topics, tools, and skills that are currently relevant and applicable in industry or academia.
Topics covered include but are not limited to:
- Advanced binary exploitation techniques
- Advanced web exploitation techniques
- Advanced reverse engineering techniques
- Hardware hacking
- Attacks against cryptographic systems
- Presentations from industry experts
Some experience or knowledge of the topics covered in Recruit is recommended
Reverse Engineering using Manticore
Sai Vegasena, OSIRIS Lab
Building Secure & Reliable Infrastructure
Nick Gregory, OSIRIS Lab
Brandon Edwards, Capsule8
Developing iOS Jailbreak Tweaks using Theos
Oskar Wirga, OSIRIS Lab