{ } NDC Conferences
About us
Dark
Light
Course Calendar
Sort after topic
Jan 20
NDC Security 2025
20 - 23 January 2025
40
Speakers
20
Technologies
8
Workshops
50
Talks
Jan 20
AI Red Teaming in Practice
Amanda Minnich (AIRT), Gary Lopez
2 days
Radisson Blu Scandinavia Hotel
13 490 NOK
Register
Jan 20
Agile Whiteboard Hacking – aka Hands-on Threat Modeling
Sebastien Deleersnyder
2 days
Radisson Blu Scandinavia Hotel
13 490 NOK
Register
Jan 22
Human Hacking: Unveiling Secrets with Social Engineering and OSINT
Karyna Kholodar
1 hour
-
Jan 22
Building a lightning fast Firewall with Java & eBPF
Johannes Bechberger
1 hour
-
Jan 22
Cyber warfare evolution: lessons from two years of russo-Ukrainian war
Anton Dykyi
1 hour
-
Jan 22
Flipping Bits: Your Credentials Are Certainly Mine
Stök ·, Joona Hoikkala
1 hour
Radisson Blu Scandinavia Hotel
-
Jan 22
Hack the Planet! What Movies can Teach Us about InfoSec
Simon Painter
1 hour
Radisson Blu Scandinavia Hotel
-
Jan 22
Hacking History: The first computer worm
Håvard Opheim
1 hour
-
Jan 23
Inside Google's Discovery and Remediation of a Critical CPU Vulnerability
Yousif Hussin
1 hour
-
Jan 23
Start covering your bases & Stop chasing APT headlines
Avishay Zawoznik
1 hour
-
Jan 23
GitHub Actions: A Cloudy Day for Security
Sofia Lindqvist
1 hour
-
Jan 23
Advanced Malware Analysis Techniques – Unmasking Hidden Threats
Ankshika Maunthrooa
1 hour
-
Jan 23
Privilege Escalation in Microsoft Azure
Christian August Holm Hansen
1 hour
-
Jan 23
Spoofing Commands - Can You Trust Process Creation Logs?
Tristan Bennett
1 hour
-
Jan 27
NDC London 2025
27 - 31 January 2025
100
Speakers
50
Technologies
12
Workshops
110
Talks
Apr 29
NDC Melbourne 2025
29 April - 1 May 2025
40
Speakers
30
Technologies
10
Workshops
50
Talks
May 19
NDC Oslo 2025
19 - 23 May 2025
150
Speakers
45
Technologies
20
Workshops
160
Talks
Sept 8
Copenhagen Developers Festival 2025
8 - 12 September 2025
100
Speakers
5
Bands
100
Talks
10
Workshops
Sept 22
NDC TechTown 2025
22 - 25 September 2025
50
Speakers
15
Technologies
10
Workshops
60
Talks
On demand courses
Attacking through the Software Supply Chain
Felix Leder
-
Contact us
How hacking works - Web Edition
Espen Sande-Larsen
-
Contact us
What happens if I change this URI… oooooh
Halvor Sakshaug
-
Contact us
Security as Code: A DevSecOps Approach
Joseph Katsioloudes
-
Contact us
Hacking the Juice Shop
Cecilia Wirén
-
Contact us
Hacker vs Azure Web Application Firewall
Laura Kokkarinen
-
Contact us
Surprising ways to escalate privileges in Entra ID
Marius Solbakken Mellum
-
Contact us
Banking Cybersecurity: Battling DeepFakes & AI-powered Scammers
George Proorocu
-
Contact us
Prompt Injection: When Hackers Befriend Your AI
Vetle Hjelle
-
Contact us
OWASP Juice Shop - An Open Source Software and security Fairytale
Björn Kimminich
-
Contact us
Stories from NC3 - investigating hackers
Sindre Breda, Åge Strand
-
Contact us
NDC Conferences uses cookies to see how you use our website. We also have embeds from YouTube and Vimeo. How do you feel about that?
All good!
Don't want it