2026 International Conference on Cybersecurity, Digital Forensics, and AI Applications (ICCSDFAI)
Workshops
1
Hands-on Cybersecurity Trainings
Real attacks. Real tools. Real environments.
🔴 Full-Scale Infrastructure Attack Simulation
End-to-end offensive operation in a corporate environment Simulate a real-world cyberattack against enterprise infrastructure — from initial access to full system compromise. You will work on:
Initial access vectors and foothold establishment
Lateral movement across network segments
Privilege escalation and domain dominance
Attack chain execution in a controlled environment
Outcome: Understand how advanced attackers operate inside real infrastructures and how breaches escalate.
🟡 Mobile Application Security Testing
Breaking modern mobile applications under realistic conditions Hands-on security assessment of a mobile banking application. You will work on:
Reverse engineering (Android/iOS)
API abuse and insecure endpoints
Authentication and session bypass techniques
Data extraction and manipulation
Outcome: Gain practical skills in identifying and exploiting mobile application vulnerabilities.
🟢 Web Application Exploitation & Defacement
From vulnerability discovery to real-world impact Explore how modern web applications are compromised and manipulated. You will work on:
OWASP Top 10 vulnerabilities in action
Exploitation of misconfigurations and logic flaws
Controlled defacement scenarios
Attack chaining in web environments
Outcome: Understand how web attacks evolve from simple flaws into full compromise scenarios.
🔵 Evasion Techniques: Why Traditional Security Fails
Understanding the limits of antivirus and signature-based defense Analyze how modern threats bypass traditional security mechanisms. You will work on:
Malware evasion techniques
Detection bypass strategies
Behavioral vs signature-based limitations
Real-world case scenarios
Outcome: Develop a deeper understanding of modern threat behavior and defensive gaps.
Course instructor
Abilkair Imanberdi
Director of Malware Research Department at TSARKA Astana, Kazakhstan
Maximum capacity for this workshop is 30 participants Registration is free
Provides candidates the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts.
Who is it For?
This course is designed to equip current and aspiring Tier I and Tier II SOC analysts with the necessary skills to excel in a Security Operations Center (SOC), including:
SOC Security Analyst
Cyber Security Analyst
Security Incident Response Analyst / SOC Analyst
Information Assurance Compliance Analyst
Cyber Incident Response Analyst
Security Analyst I
Global Information Security SOC Team Lead
Program Analyst
Duration
June, 25 - 27, 2026
Day One: Friday, June 25
Module 01: Security Operations and Management Module 02: Understanding Cyber Threats, IoCs and Attack Methodology
Day Two: Saturday, June 26
Module 03: Log Management Module 04: Incident Detection and Triage