Adversarial Tradecraft And Detection

Home / Events / Adversarial Tradecraft And Detection 

Event Description

Presented by Break The Code CTF , this intensive two-day training is a deep dive into the sophisticated world of modern cyber attacks and defense. We bridge the gap between theory and practice, offering an immersive experience in cutting-edge adversarial tradecraft and next-generation detection strategies.

Participants will move beyond basic security principles and gain hands-on exposure to the real-world offensive techniques used by advanced threat actors. You will learn to think like an attacker—developing custom implants, establishing initial access, and evading state-of-the-art defenses. Crucially, you will then pivot to the defender’s perspective, learning the advanced detection engineering and threat hunting measures required to identify and neutralize these threats in your own environment.

This is not a theoretical course; it’s a practical, hands-on workshop designed to arm you with the battle-tested skills needed to excel in cybersecurity today.

Event Information

Date

23rd - 24th October

Event Location

Kobi's Event Center, Accra

Format

100% In-Person, Hands-On Training

This advanced training is not intended for beginners. It is a deeply technical, hands-on course designed for cybersecurity practitioners who want to build practical skills in offensive operations and defensive countermeasures. The curriculum involves on-keyboard execution of simulated attacks in a dedicated lab environment. It is ideal for:

  • Penetration Testers & Red Teamers

  • SOC Analysts, Threat Hunters & Incident Responders

  • Malware Analysts & Reverse Engineers

  • Cybersecurity Engineers & Architects

To ensure a successful learning experience for all participants, attendees should meet the following requirements:

  • A solid, practical understanding of networking fundamentals (TCP/IP, DNS, HTTP/S).

  • Comfort and familiarity working with both Windows and Linux command-line interfaces.

  • Basic experience with a scripting language such as Python or PowerShell is highly recommended.

  • A strong desire to learn and a professional attitude.

All attendees are required to bring their own equipment to participate in the hands-on labs:

  • A modern laptop capable of running virtualization software.

  • Minimum System Specs: 8GB RAM (16GB+ recommended), 1TB of free disk space.

  • Administrative access on the laptop is mandatory to install tools and configure network settings.

  • Virtualization software installed, such as VMware Workstation/Player

  • An up-to-date web browser (Chrome or Firefox).

This intensive training provides hands-on experience across the entire attack lifecycle, from both an offensive and defensive perspective. You will learn to:

  • Build Custom Implants: Go beyond standard tools by designing and developing your own Command & Control (C2) implants that use in-memory execution to evade static detection.

  • Execute Initial Access Campaigns: Master the art of gaining a foothold by weaponizing documents for advanced phishing attacks and exploiting public-facing vulnerabilities.

  • Bypass Modern EDRs: Learn hands-on techniques to circumvent and blind Endpoint Detection & Response solutions by unhooking APIs and disrupting security telemetry like ETW and Event Logs.

  • Hunt Advanced Threats: Switch to a defensive mindset and learn to detect the very evasion techniques you just learned, writing high-fidelity detection rules to identify sophisticated attackers in your network.