Feb 2020


Dubai Police Officer's Club


245 Tickets


12 Professional Speakers

You have mostly known them from their online presence. You have loved their teaching and learned from their skills. And now it is time to meet them in person! The amazing hackers, speakers and trainers behind Hackers Academy (and a few more) will be in Dubai for a live event!

Get ready for a jam packed event!

  • 2 days free conference. Yes free!
  • Multiple technical training tracks
  • World renowned speakers


Register now to reserve your spot.


Alt image

Training & Conference

Corelan Advanced – $3250

Dates: 7-10 December 2019 This is a 4-day training The Corelan “ADVANCED” exploit development class is a fast-paced, mind-bending, hands-on course where you will learn advanced exploit

Hacking With Kali Linux – $1950

This is a 3-day training Kali Linux is the most used Linux distribution by ethical hackers and penetration testers. It provides an arsenal of tools that are essential to

دورة إختبار إختراق تطبیقات الویب – $1750

هذه الدورة تمتد على 4 أيام ● ماذا سیتعلم المشارك في هذه الدورة؟ تحلیل طلبات تطبیقات الویب ● فحص تطبیقات الویب من الثغرات الأمنیة المتنوعة ● التعامل

Advanced Infra Security Assessment – $1950

Security systems are evolving and becoming more complex, so are the hacking techniques. Every successful hack penetrating network infrastructure has to evade through multiple layers of security in a


Keynote delivered by Dubai Police

Bug Hunting For The Masses

Software is in almost every aspect of our lives nowadays. Whether its mobile tech or desktop computing or the more recent IOT devices, all have software implemented inside them

Access Control: We Are All DOOMed

A short introduction to physical security principles and access control technologies and RFID hacking. Talk will be touching on a broad spectrum of topics including principles of design and

Identity and Access Management: The Changing Landscape

Most security breaches are a result of Unauthorized Access. Therefore, Identity and Access Management (IAM) is at the top of security executive’s agenda. This keynote session will cover the

DevSecOps: Tell-a-tale

With most organizations embracing the journey of DevOps, security practices still follow the same traditional approach. Security practices in the time of DevOps discipline need to catch up

Speakers & Trainers

Peter Van Eeckhoutte

Founder / Corelan

Peter Van Eeckhoutte is the founder of Corelan Team and the

Brian Gorenc

Director of Vulnerability Research / Trend Micro

Brian Gorenc is the Director of Vulnerability Research with Trend Micro.

Abdul-Aziz Hariri

Security Researcher / Trend Micro

Abdul-Aziz Hariri is a security researcher with the Zero Day Initiative

Sami Ghouri

Physical Security Consultant / Argent Elm

Sami is an ASIS certified Physical Security consultant by trade, computer

Yasser Ali

Senior Cyber Security Consultant / Thales

Yasser Ali is a Cyber Security Consultant at Thales and

Mazin Faour

Security Consulting Senior Manager / Accenture

Mohammed Khreesha

Security Consultant & Author

Mohammad Khreesha is a cybersecurity consultant from Jordan with 13+ years


Security Trainer & Speaker

Toufiq is a security professional with over a decade of experience


Vuln Researcher & Reverse Engineer

Omair has over a decade of experience in penetration testing, vulnerability

Register now

For Training Registration, Please Select Desired Training From Schedule


Event FAQS

Attending the conference is free and is open for the public. Seating is limited and is on a first come first served basis. Registration will close once we reach the maximum capacity.
Yes. But priority of seating will be given to those who already registered online. You are welcome to register upon arrival, but we do not guarantee any seating.
Different trainings have different cost. Please refer to the training section.
Please send us a summary about yourself, your topic and your agenda using the Contact Us page. And we will get back to you as soon as possible. Please keep in mind that any talks or training must be technical, practical and vendor neutral.

Contact Us

Event Location