← Back to Trainings

Hacking The Enterprise

May 15 (Friday) 2026 • $1600

Price: $1600 The focus of this course will be on the methodologies, processes, attack vectors, tools, and AI-assisted techniques used for exploitation across infrastructure, web, and cloud environments. Students will explore both traditional exploitation practices and the integration of AI-driven fr

Course Outline

Price: $1600
The focus of this course will be on the methodologies, processes, attack vectors, tools, and AI-assisted techniques used for exploitation across infrastructure, web, and cloud environments. Students will explore both traditional exploitation practices and the integration of AI-driven frameworks that enhance reconnaissance, vulnerability discovery, and exploit development.
By the end of the course, students will gain an in-depth understanding of the underlying principles of network and application exploitation, while also learning how AI can be leveraged to automate analysis, identify potential weaknesses, generate exploit strategies, and simulate attacks with greater efficiency. Through hands-on labs and guided exercises, students will develop practical experience in the successful execution of exploitation techniques, supported by both conventional and AI-augmented toolsets.
Minimum Course Requirements:
 
* Bring a Laptop with:
   * 16GB of RAM
   * Quad-Core Processor
   * Ability to Run Virtual Machines
   * Apple M Chips are NOT compatible with this training’s material
* Prerequisites
   * Understanding of basic networking concepts
   * Basic Linux comprehension
Target Audience: This seminar is geared toward those seeking to enter the information security industry while also enriching those who seek to develop the skills and experience necessary to succeed as a penetration tester (for fun and for-profit).
Trainer(s) bio:Rod Soto has over 15 years of experience in information technology and security. Has worked in Security Operations Centers as a support engineer, soc engineer, security emergency response, and incident response. Currently working as a detection engineer and researcher at Splunk Cisco Threat Research Team. Previously worked at Prolexic/AKAMAI, Splunk UBA, JASK (SOC Automation).

Rod Soto was the winner of the 2012 BlackHat Las Vegas CTF competition and Red Alert ICS CTF at DEFCON 2022 contest. He has spoken at ISSA, ISC2, OWASP, DEFCON,  RSA Conference,Hackmiami, DerbyCon, Splunk .CONF, Black Hat,BSides, Underground Economy and also been featured in Rolling Stone Magazine, Pentest Magazine, Univision, BBC, Forbes, VICE, Fox News and CNN.

Location

Marenas Beach Resort — 18683 Collins Avenue, Sunny Isles Beach, FL 33160