CIACON
Training

CIACON Training is more than a workshop. It's a hands-on experience built by and for cybersecurity professionals. Real techniques, real scenarios, and real-world context from practitioners who operate at the front lines every day.

From offensive tactics to defensive strategies, our trainers bring what textbooks can't โ€” lived experience. CIACON exists to keep that knowledge flowing all year long.

// Past Trainings

Past Sessions

FILE // 001
โœ“ Completed
Abraham Aranguren
01

Mobile App Attacks, By Example

Abraham Arangurenโ€”CEO, 7ASecurity

Presenting Abraham Aranguren (7ASecurity) โ€” giving his first ever training in the subcontinent. Trainings provided by him have helped thousands of students enhance their skillset. He enlightened participants with real-world examples on Practical Mobile App Attacks.

OSCPOSCEGWAPT
DateDecember 03โ€“06, 2020
Participants120+
LinkedIn โ†—
FILE // 002
โœ“ Completed
Sankarraj Subramanian
02

Cyber Forensics

Sankarraj Subramanianโ€”Founder & CEO, Prompt Watch

Cyber forensics mainly focuses on analyzing encrypted data, recovering records and investigating possible security breaches. Learn the ins & outs of the topic from Mr. Sankarraj Subramanian and equip yourself with an unparalleled skillset.

GCFAGCIHCHFI
DateDecember 03โ€“06, 2020
Participants95+
LinkedIn โ†—
FILE // 003
โœ“ Completed
Sanjeev Multani
03

Buffer Overflows

Sanjeev Multaniโ€”Cyber Security Consultant

Buffer Overflow occurs when data exceeds the storage capacity of a buffer, potentially corrupting or crashing the system. Join this extensive learning session by Mr. Sanjeev Multani and develop your expertise on this critical vulnerability class.

CEHOSCPCRTP
DateDecember 03โ€“06, 2020
Participants85+
LinkedIn โ†—
// Open Application

Call
For
Trainers

Got knowledge worth sharing? CIACON gives you the stage. Join a community of practitioners who are shaping the next generation of cybersecurity professionals โ€” one session at a time.

01Bring your real-world experience to an engaged, technical audience
02Design your own curriculum โ€” your expertise, your way
03Deliver immersive, hands-on learning that leaves a lasting impact
contact@ciaconference.com
// Upcoming
Restricted Access

Upcoming Sessions

Details will be revealed soon. Stay tuned.

Trainer Name

Security Researcher

OSCPCEHCRTO

[ Advanced Red Team Operations ]

A comprehensive deep-dive into modern red team tactics, adversary simulation, and real-world attack chain construction. Participants will gain hands-on experience with tools and techniques used by elite offensive security teams.

DateComing Soon
SeatsLimited
Enrollment Opening Soon

Trainer Name

Malware Analyst

GREMGCFAGCIH

[ Malware Analysis & Reverse Engineering ]

Learn to dissect, analyze, and understand modern malware from static and dynamic perspectives. Covers everything from basic disassembly to advanced unpacking and behavioral analysis in controlled lab environments.

DateComing Soon
SeatsLimited
Enrollment Opening Soon
// Philosophy

Our Training Ethos

Across all sessions, one principle remains constant: industry-ready security comes from learning directly from practitioners who operate at the front lines.

Our trainers are not career lecturersโ€”they are builders, investigators, and attackers who bring real-world context into every session. This is how we ensure our conferences and trainings continue to deliver practical, relevant, and future-proof cybersecurity education.

Next Chapter

New voices. New expertise. New sessions.
Speaker announcements dropping soon.

Stay tuned

Apply to Train at CIACON

Share your expertise and shape the next generation of cybersecurity professionals

01Trainer Information

02Training Proposal

0 / 100โ€“300 words

03Lab & Logistics

Leave blank if no preference. Most CIACON workshops run 20โ€“50 participants.

04Experience & Credentials

List relevant certifications, awards, or industry recognition.