Infiltrate Security Conference

Learn more about the training offered at Infiltrate


Our IMMUNITY training courses offer (ISC)2 CPE credits for CISSP, CSSLP and SSCP certifications. Just let us know that you are interested in earning credits after your register by emailing

If you are trying to determine which class you are best suited for, just email and ask for the evaluation test for the course(s) you are interested in.

If you sign up for one of Immunity’s training classes and the conference briefings pass, you are eligible for a bundle discount. Visit the Register page for more information.

For a copy of the training class schedule please visit here or for a PDF version click here.


On Wednesday April 25th from 8:30am - 11:30am EDT, Vector 35 will conduct a workshop at the Fontainebleau Hotel. Below is an overview of the Workshop, as well as the student and technical requirements for the course. Visit the Register page for more information and to sign up!

For a copy of the training class schedule please visit here or for a PDF version click here.

CPE Credits
April 22nd - April 25th
April 22nd - April 25th
April 22nd - April 25th

Included in the above pricing for IMMUNITY courses is:

  • PDF Training Manual on a USB Stick
  • Laptop to use throughout the class
  • Attendance certificate
  • Breakfast and lunch buffet on class days

Training Event Details

IMMUNITY: Click Here For Ring0 (SOLD OUT)
28 CPE Credits
Immunity's Click Here for Ring0 class teaches both Windows clientside exploitation as well as Windows kernel exploitation. These two combined courses complement each other perfectly through hands-on exploitation that takes the student from gaining remote access to elevating privileges on modern Windows systems. This is an intermediate class that requires a solid grasp of userland and kernel debugging on Windows platforms.
IMMUNITY: Master Track: Applied Cryptanalysis
28 CPE Credits
The Immunity Cryptanalysis class takes traditionally dense Academic cryptanalytic theory and presents it in a practical way. The course relates each topic to practical examples. As students progress through the course they will take away real world cryptanalytic skills they can start employing immediately. Students learn to effectively recognize and exploit weakly implemented cryptography based on real world examples. More importantly, students will learn a methodology for expanding their own cryptanalytic prowess by learning to use a practical cryptanalytic tool chain. This course sets experienced vulnerability researchers up with the base they need to expand into the world of flawed cryptography.
IMMUNITY: Master Track: Kernel Exploitation (SOLD OUT)
28 CPE Credits
The Immunity Kernel Exploitation Master Track focuses on modern exploit development and vulnerability discovery techniques. Intermediate to advanced exploit development skills are recommended for students wishing to attend this class.
28 CPE Credits
Immunity's Web Hacking class has a heavy emphasis with hands-on-learning, going in-depth on XSS, SQLi, XXE and Web Crypto. The token system has been improved from previous years, which allows us to track how each individual student is performing in class and indicates if a student could use extra help with a particular subject. The token system also allows for students to compete for the top score (often for fabulous prizes). Come to Web Hacking and receive instruction from members of Immunity's senior consulting team!
IMMUNITY: Wide Open to Interpretation / JAVA Exploitation
21 CPE Credits
This class will cover auditing modern Java applications, exploiting vulnerabilities from a wide variety of vulnerability classes. From the home desktop, to the enterprise, Java is consistently present in ways you would not expect it to be. This class will teach you how to take advantage of the insidious layer of Java bubbling through the cracks of the modern enterprise attack surface.
VECTOR35: Binary Ninja Workshop
0 CPE Credits
Want to find more bugs? Speed up your reverse engineering? Automate tedious tasks and let Binary Ninja do some of the hard work. This half-day class is a crash course in program analysis concepts and applying them to reverse engineering and vulnerability research. You'll learn what use an SSA form can have, the limitations of value set analysis and static data flow, when to use a particular abstraction layer, and most importantly, gain practice on concrete examples and produce working code before the end.
Powered by Eventbrite


Click on the images below to visit the sponsor’s homepage. Click here if you want to become a sponsor for INFILTRATE 2018.

Immunity Inc.
Trail of Bits
Amazon Web Services
Siege Technologies