JUNE 25-27, 2026, İstinye University, Istanbul

2026 International Conference on Cybersecurity, Digital Forensics, and AI Applications (ICCSDFAI)

Workshops

1
Hands-on Cybersecurity Trainings
Real attacks. Real tools. Real environments.

  • 🔴 Full-Scale Infrastructure Attack Simulation
    End-to-end offensive operation in a corporate environment
    Simulate a real-world cyberattack against enterprise infrastructure — from initial access to full system compromise.
    You will work on:
    • Initial access vectors and foothold establishment
    • Lateral movement across network segments
    • Privilege escalation and domain dominance
    • Attack chain execution in a controlled environment
    Outcome:
    Understand how advanced attackers operate inside real infrastructures and how breaches escalate.
  • 🟡 Mobile Application Security Testing
    Breaking modern mobile applications under realistic conditions
    Hands-on security assessment of a mobile banking application.
    You will work on:
    • Reverse engineering (Android/iOS)
    • API abuse and insecure endpoints
    • Authentication and session bypass techniques
    • Data extraction and manipulation
    Outcome:
    Gain practical skills in identifying and exploiting mobile application vulnerabilities.
  • 🟢 Web Application Exploitation & Defacement
    From vulnerability discovery to real-world impact
    Explore how modern web applications are compromised and manipulated.
    You will work on:
    • OWASP Top 10 vulnerabilities in action
    • Exploitation of misconfigurations and logic flaws
    • Controlled defacement scenarios
    • Attack chaining in web environments
    Outcome:
    Understand how web attacks evolve from simple flaws into full compromise scenarios.
  • 🔵 Evasion Techniques: Why Traditional Security Fails
    Understanding the limits of antivirus and signature-based defense
    Analyze how modern threats bypass traditional security mechanisms.
    You will work on:
    • Malware evasion techniques
    • Detection bypass strategies
    • Behavioral vs signature-based limitations
    • Real-world case scenarios
    Outcome:
    Develop a deeper understanding of modern threat behavior and defensive gaps.
Course instructor
Abilkair Imanberdi
Director of Malware Research Department at TSARKA
Astana, Kazakhstan

2
Certified SOC analyst
Ferro Technic’s Three-Day Online Workshop
Provides candidates the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts.

Who is it For?
This course is designed to equip current and aspiring Tier I and Tier II SOC analysts with the necessary skills to excel in a Security Operations Center (SOC), including:
  • SOC Security Analyst
  • Cyber Security Analyst
  • Security Incident Response Analyst / SOC Analyst
  • Information Assurance Compliance Analyst
  • Cyber Incident Response Analyst
  • Security Analyst I
  • Global Information Security SOC Team Lead
  • Program Analyst
Duration
June, 25 - 27, 2026
Day One:
Friday, June 25
Module 01: Security Operations and Management
Module 02: Understanding Cyber Threats, IoCs and Attack Methodology
Day Two:
Saturday, June 26
Module 03: Log Management
Module 04: Incident Detection and Triage
Day Three
Sunday, June 27
Module 05: Proactive Threat Detection
Module 06: Incident Response
Course instructor
Prof. Dr. Feroz Hyder
President & CEO of Ferro Technics
Ontario, Canada
Cost
Certified SOC Analyst
$350
3 days. 6 modules. Journey starts here
Sale will be available soon
Maximum capacity for this workshop is 30 participants
To register you need to provide Stripe payment receipt
Registration will be opened soon
Made on
Tilda