{"product_id":"ai-soc-101-bootcamp-building-modern-security-operation-skills-with-ai-integration-rod-soto-dctlv2026","title":"AI + SOC 101 Bootcamp: Building Modern Security Operation Skills with AI Integration - Rod Soto - DCTLV2026","description":"\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eName of Training\u003c\/strong\u003e\u003cspan\u003e\u003cstrong\u003e:\u003c\/strong\u003e AI + SOC 101 Bootcamp: Building Modern Security Operations Skills with AI Integration\u003cbr\u003e\u003c\/span\u003e\u003cstrong\u003eTrainer(s)\u003c\/strong\u003e\u003cspan\u003e\u003cstrong\u003e:\u003c\/strong\u003e Rod Soto\u003cbr\u003e\u003c\/span\u003e\u003cstrong\u003eDates\u003c\/strong\u003e\u003cspan\u003e\u003cstrong\u003e:\u003c\/strong\u003e \u003cmeta charset=\"utf-8\"\u003eAugust 10-11, 2026\u003cbr\u003e\u003c\/span\u003e\u003cspan\u003e\u003cstrong\u003eTime:\u003c\/strong\u003e 8\u003c\/span\u003e\u003cspan\u003e:00 am to 5:00 pm \u003cbr\u003e\u003c\/span\u003e\u003cstrong\u003eVenue\u003c\/strong\u003e\u003cspan\u003e\u003cstrong\u003e:\u003c\/strong\u003e \u003cmeta charset=\"utf-8\"\u003eLas Vegas Convention Center\u003cbr\u003e\u003c\/span\u003e\u003cstrong\u003eCost\u003c\/strong\u003e\u003cspan\u003e\u003cstrong\u003e: \u003c\/strong\u003e$2,500 (USD)\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eShort Summary:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003eLearn core Security Operations Center (SOC) skills enhanced with AI-powered tooling in an intensive, lab-driven bootcamp. Students will work through realistic SOC analyst workflows—log analysis, detection, investigation, and response—while integrating modern AI\/LLM tools into their processes. This course is designed to bridge traditional SOC fundamentals with AI-driven detection, analysis, and automation, preparing participants for today’s rapidly evolving security landscape\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eCourse Description: \u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eThis two-day bootcamp delivers practical, hands-on training in SOC fundamentals with a strong focus on real-world workflows and AI augmentation. Students will work directly with logs, packets, SIEMs, EDR platforms, and AI tools that mirror what’s used in modern security operations.\u003c\/p\u003e\n\u003cp\u003eParticipants will start with foundational concepts—SOC roles, access controls, logging, and incident triage—then progressively move into network analysis, SIEM workflows, detection engineering, and adversarial simulation. Throughout the course, AI and LLMs are positioned as force multipliers: enhancing detection, supporting triage, summarizing evidence, and accelerating investigation.\u003c\/p\u003e\n\u003cp\u003eBy the end of the bootcamp, students will be able to:\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand how a SOC operates and where a Level 1 analyst fits.\u003c\/li\u003e\n\u003cli\u003eCollect, parse, and analyze security logs from Windows, Linux, and network sensors.\u003c\/li\u003e\n\u003cli\u003eUse tools like Sysmon, Zeek, Arkime, Suricata, Elasticsearch, Splunk, and Wazuh in realistic scenarios.\u003c\/li\u003e\n\u003cli\u003eApply frameworks such as MITRE ATT\u0026amp;CK, ATT\u0026amp;CK-based kill chains, and OWASP Top 10 to detection and incident analysis.\u003c\/li\u003e\n\u003cli\u003eIntegrate AI\/LLMs into SOC workflows for triage, summarization, and threat hunting.\u003c\/li\u003e\n\u003cli\u003eRecognize and mitigate security risks introduced by AI and LLM usage (including Shadow AI and MCP-based agents).\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp style=\"text-align: left;\"\u003eThe course emphasizes practical, baseline SOC analyst competencies that are enhanced—but never replaced—by AI. Graduates will leave with a well-rounded skill set suitable for SOC Analyst 1 roles in AI-enabled environments.\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eCourse Outline: \u003c\/strong\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eDay 1 – SOC Fundamentals \u0026amp; Core Tooling\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e\n\u003cstrong\u003e\u003c\/strong\u003eFundamentals of a SOC\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eIntroduction and instructor background\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eWhat is a Security Operations Center (SOC)?\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eRoles and responsibilities of a SOC analyst\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eSecurity posture, SecOps, and the pillars of information security (Confidentiality, Integrity, Availability)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eAccess Controls \u0026amp; Operating Systems\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eAccess control concepts: Authentication, Authorization, Principle of Least Privilege (PoLP), Separation of Duties (SoD)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eAccess control models: MAC, DAC, RBAC, ABAC, risk-based access\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eDefense in Depth and Endpoint Detection \u0026amp; Response (EDR)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eHands-on Exercises (Access Controls)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eLinux: Mandatory and discretionary access controls (AppArmor, file permissions)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eWindows: Access controls in Active Directory, NTFS permissions, and local\/system accounts\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eWindows: Processes, integrity levels, and permissions\u003c\/li\u003e\n\u003cli\u003eSecurity Events \u0026amp; Logging\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eSecurity events vs. incidents; triage fundamentals (true\/false positives, CISA severity)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eLog structure and common formats: JSON, XML, YAML, CSV\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eText manipulation and regular expressions (regex) for log parsing\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eWindows and Linux log sources: EVTX, Syslog\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eSysmon overview and configuration\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eHands-on exercise: Installing Sysmon and detecting malicious activity in logs\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eNetwork Basics \u0026amp; Intrusion Detection\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eNetwork fundamentals for SOC analysts: packet capture, TCPDump, Wireshark\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eCore protocols: TCP\/IP, DNS, HTTP\/HTTPS\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eCommon network attacks and artifacts\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eNetwork analysis tools: Zeek, Arkime, and Suricata in SOC workflows\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eStandards \u0026amp; Frameworks\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eCVE, CWE, CAPEC\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eMITRE ATT\u0026amp;CK, ATLAS\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eOWASP Top 10\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eKey compliance frameworks and why they matter to SOCs\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eHands-on exercise: Replicating an OWASP Top 10 attack and observing\/analyzing the resulting logs\u003cbr\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDay 2 – SIEM, EDR, and AI-\/Agentic-Enhanced SOC Workflows\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eCentralized Logging \u0026amp; SIEM\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eCIS Critical Security Controls for log management\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eRemote log collection (WEC\/WEF, SIEM agents)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eSIEM fundamentals and core use cases\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eHands-on Exercises (Elastic Stack)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eElasticsearch setup\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eThreat discovery using search, filters, and dashboards\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eIntegrating Zeek and Windows logs (Winlogbeat)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eHands-on Exercises (Splunk)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eIntroduction to Splunk: architecture, apps, and add-ons\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eRunning Splunk in Docker and exploring the UI\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eData onboarding, basic searches, and threat discovery\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eAnalyzing Suricata IDS logs in Splunk\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eEndpoint Detection \u0026amp; Response (EDR)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eEDR concepts and the role of EDR in SOC operations\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eWazuh as an open-source EDR platform\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eAdversarial Simulation \u0026amp; Detection Engineering\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eIaC and modern SOC infrastructure (ephemeral\/immutable)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eDetection engineering fundamentals\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eCryptography touchpoints and SOC-adjacent teams \u0026amp; Legal considerations\u003cbr\u003e(IR, CIRT\/SERT, Legal)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eAI\/LLMs, MCP, and the Agentic SOC\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eAI + SOC foundations (LLMs, multimodal models, core concepts)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003ePractical SOC applications (enrichment, summarization, anomaly\u003cbr\u003edetection, agentic workflows)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eLLM\/agent usage examples and prompt best practices\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eFree and open-source LLMs (e.g., GPT4All, Ollama) and local deployment\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eAgentic workflow basics(LangChain ecosystem, CrewAI, A2A)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eAgentic SOC applications\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eAI\/LLM\/MCP\/Agent Risks \u0026amp; Frameworks (OWASP, MITRE ATLAS)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eRisks of LLMs\/MCP\/Agents\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eShadow AI and unapproved model\/agent usage\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eMonitoring and logging requirements for LLM and agent orchestration visibility\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eOWASP Top 10 for LLMs and agentic applications\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eAgentic security: monitoring and threat surface\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eAI SOC Exercises\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eSetting up Ollama Web UI and describing a synthetic firewall dataset\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eAgentic security workflow: from log → detection → incident\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eDetecting LLM\/MCP abuse using log telemetry (Splunk MCP LLM SIEMulator)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eOptional: agentic workflow security analysis\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eCTF-style SOC challenges\u003cbr\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDifficulty Level:\u003c\/strong\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003eBeginner to Intermediate.\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003eStudents should have foundational IT knowledge and basic networking familiarity. The course builds on this baseline to develop practical SOC analyst skills with integrated AI tooling. No prior SOC or AI experience is required.\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eBeginner Definition - The student has an interest in the topic presented and general technology knowledge that a power user or undergraduate student may have acquired.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eIntermediate Definition - The student has education and some experience in the field and familiarity with the topic being presented. The student has foundational knowledge that the course will leverage to provide practical skills on the topic.\u003c\/span\u003e\u003cspan\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eSuggested Prerequisites:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli dir=\"ltr\"\u003eBasic understanding of networking concepts (TCP\/IP, DNS, HTTP\/HTTPS)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli dir=\"ltr\"\u003eFamiliarity with Linux command-line operations\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli dir=\"ltr\"\u003eGeneral awareness of cybersecurity threats and terminology\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli dir=\"ltr\"\u003eComfort with technical content and hands-on labs\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eWhat Students Should Bring: \u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli dir=\"ltr\"\u003eLaptop with at least 16 GB RAM (32 GB recommended)\u003c\/li\u003e\n\u003cli dir=\"ltr\"\u003eAbility to run virtual machines (VMware Workstation, VirtualBox, or similar)\u003c\/li\u003e\n\u003cli dir=\"ltr\"\u003eMinimum 50 GB of free disk space\u003c\/li\u003e\n\u003cli dir=\"ltr\"\u003eAdministrative privileges on the laptop\u003cbr\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp dir=\"ltr\"\u003eNote: Apple M-series laptops are not compatible with the course VMs; Intel\/AMD x86-64 architecture is required.\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eWhat the Trainer Will Provide:\u003c\/strong\u003e\u003cspan style=\"font-family: -apple-system, BlinkMacSystemFont, 'San Francisco', 'Segoe UI', Roboto, 'Helvetica Neue', sans-serif; font-size: 0.875rem;\"\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli dir=\"ltr\"\u003ePre-configured virtual machine images with all required tools and lab environments\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli dir=\"ltr\"\u003eComprehensive course workbook with exercises and reference materials\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli dir=\"ltr\"\u003eAccess to lab scenarios and synthetic datasets\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli dir=\"ltr\"\u003eDetection rule templates and practical examples\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli dir=\"ltr\"\u003eResource guides for continued self-study after the course\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp dir=\"ltr\"\u003e\u003cstrong style=\"font-family: -apple-system, BlinkMacSystemFont, 'San Francisco', 'Segoe UI', Roboto, 'Helvetica Neue', sans-serif; font-size: 0.875rem;\"\u003eTrainer(s) Bio:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003eRod Soto has over 15 years of experience in information technology and cybersecurity, with deep expertise in Security Operations Centers. He has served as a SOC support engineer, SOC engineer, security emergency response analyst, and incident responder, and currently works as a detection engineer and researcher on Splunk’s Cisco Threat Research Team. His previous roles include positions at Prolexic\/Akamai, Splunk UBA, and JASK (SOC automation).\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003eRod is an accomplished cybersecurity competitor and educator. He won the Black Hat Las Vegas CTF in 2012 and the Red Alert ICS CTF at DEF CON 2022. He has presented at DEF CON, Black Hat, RSA Conference, Splunk .CONF, DerbyCon, BSides events, HackMiami, and numerous ISSA, ISC2, and OWASP chapters. His work and commentary have appeared in major media outlets including Rolling Stone, Pentest Magazine, Forbes, VICE, BBC, Univision, Fox News, and CNN.\u003c\/p\u003e\n\u003cp\u003eRod’s current research at Splunk–Cisco focuses on securing AI and LLM ecosystems, including:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eDeveloping the Splunk Technology Add-on for Ollama to monitor Shadow AI deployments.\u003c\/li\u003e\n\u003cli\u003eCreating detection frameworks for Microsoft 365 Copilot security threats.\u003c\/li\u003e\n\u003cli\u003eAnalyzing LLM-based attack vectors such as the PromptLock ransomware proof-of-concept.\u003c\/li\u003e\n\u003cli\u003ePublishing on monitoring MCP servers (open-source LLM MCP Security Monitoring Tool).\u003c\/li\u003e\n\u003cli\u003eUsing RAG with Splunk ESCU and MLTK to build AI-enhanced security detections aligned with the MITRE ATLAS framework.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eHe combines frontline SOC experience, active research, and a strong teaching background to deliver training that is both practical and current.\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eProficiency Exam Option:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003eThis course has the option for a proficiency certificate add-on. \u003c\/p\u003e\n\u003cp\u003eStudents who purchase the proficiency exam add-on will complete a capstone challenge simulating a real-world SOC investigation (CTF-style).\u003c\/p\u003e\n\u003cp\u003eThe exam covers:\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eAlert triage\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eThreat detection\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eIncident analysis\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eResponse documentation\u003cbr\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eStudents must score at least 75% to pass.\u003c\/p\u003e\n\u003cp\u003eThose who opt in will receive:\u003cbr\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eDetailed performance feedback\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eIndividualized coaching on areas for improvement\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli\u003eA verified certificate of proficiency suitable for professional portfolios and employment verification\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp dir=\"ltr\"\u003ePlease reach out to training@defcon.org for any questions related to the proficiency exam and certificate option.\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eRegistration Terms and Conditions: \u003c\/strong\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eTrainings are refundable before July 11, 2026, minus a non-refundable processing fee of $250.\u003c\/span\u003e\u003cspan\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eBetween July 11, 2026 and August 5, 2026 partial refunds will be granted, equal to 50% of the course fee minus a processing fee of $250.\u003c\/span\u003e\u003cspan\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eAll trainings are non-refundable after August 5, 2026.\u003c\/span\u003e\u003cspan\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eTraining tickets may be transferred to another student. Please email us at training@defcon.org for specifics.\u003c\/span\u003e\u003cspan\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eIf a training does not reach the minimum registration requirement, it may be cancelled. In the event the training you choose is cancelled, you will be provided the option of receiving a full refund or transferring to another training (subject to availability).\u003c\/span\u003e\u003cspan\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eFailure to attend the training without prior written notification will be considered a no-show. No refund will be given.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eDEF CON Training may share student contact information, including names and emails, with the course instructor(s) to facilitate sharing of pre-work and course instructions. Instructors are required to safeguard this information and provide appropriate protection so that it is kept private. Instructors may not use student information outside the delivery of this course without the permission of the student.\u003c\/span\u003e\u003cspan\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eBy purchasing this ticket you agree to abide by the \u003c\/span\u003e\u003ca href=\"https:\/\/defcon.org\/html\/links\/dc-code-of-conduct.html\"\u003e\u003cspan\u003eDEF CON Training Code of Conduct\u003c\/span\u003e\u003c\/a\u003e\u003cspan\u003e and the registration terms and conditions listed above.\u003c\/span\u003e\u003cspan\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eSeveral breaks will be included throughout the day. Please note that food is not included.\u003c\/span\u003e\u003cspan\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eAll courses come with a certificate of completion, contingent upon attendance at all course sessions. Some courses offer an option to upgrade to a certificate of proficiency, which requires an additional purchase and sufficient performance on an end-of-course evaluation.\u003c\/span\u003e\u003c\/p\u003e","brand":"Las Vegas 2026","offers":[{"title":"Course only - Aug 10-11","offer_id":47667576832218,"sku":null,"price":2300.0,"currency_code":"USD","in_stock":true},{"title":"Course + Proficiency Exam - Aug 10-11","offer_id":47667576864986,"sku":null,"price":2600.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0629\/2088\/4442\/products\/rodsoto.jpg?v=1672873541","url":"https:\/\/training.defcon.org\/products\/ai-soc-101-bootcamp-building-modern-security-operation-skills-with-ai-integration-rod-soto-dctlv2026","provider":"defcontrainings","version":"1.0","type":"link"}