Training at Kiwicon has a twist; there's some for-pay training classes available on Tuesday 9th, and the same (or similar) training is available for free on Wednesday 10th. Why would you pay for something that you can get for free? Well, consider the abridged Kiwicon Code Of Conduct:

"Don't be a shitweasel"

If you work in the industry, or your work is paying for you to be at the Con, or if you have some other kind of fat cash paying gig, then we think it'd be swell of you to pay your way, and leave the free classes for those who can't afford it. In particular, we'll give priority to those with student tickets or jobs outside the relatively-well paid IT sector. If you try and sign up for the free classes from your fancy-pants dr.contractor.mr.the.plague.sir@fatcash.govt.nz, you're a jerk.

Kiwicon's about sharing the knowledge, so by paying your way, you're helping those who cant yet afford to.

UPDATED 15 Oct 2014: Note that training venues and times are still being arranged. The day won't change, but the times are unconfirmed at present.

Quick List

Details

TitlePenetration Testing Java applications for Fun and Profit (Paid)
AbstractTraining info
LocationTue 09 0900 @ Enspiral Board Room
Duration240 mins
NameDavid Jorm
OriginBrisbane, Australia
BioDavid has been involved in the security industry for the last 15 years. He currently works as a manager for Red Hat's product security team, focusing on cloud and middleware products. He has been quoted in a major newspaper as saying North Korea's nuclear program is "ready to rock".

TitleOSINT Training (paid)
AbstractTraining info
LocationTue 09 0900 @ Auldhouse Training
Duration480 mins
NameSimon Howard
OriginWellington, New Zealand
BioSimon owns and operates security consultancy ZX Security which helps organisations inject security into their processes and systems. Simon also co-founded and helps run NZ bestest Hacker conference - Kiwicon.

TitleIntro to SDR and Signal Processing (Paid)
AbstractTraining info
LocationTue 09 0900 @ Catalyst Training Room
Duration480 mins
NameTim Kuester
OriginMaryland USA
Bio Wow. Writing about yourself in the 3rd person is weird. Tim Kuester is a Computer Engineer living in Maryland. Over the past four years, he's worked on some pretty sweet projects involving FPGA's, microcontrollers, circuit board design, and radios. He secretly wants to write a blog like Dave Jones and Craig Heffner, but he's not cool enough to do that yet.

TitleSecurity for Rails Developers (Paid)
AbstractTraining info
LocationTue 09 0900 @ Aura Infosec Office
Duration480 mins
NameAndrew Kampjes, @akampjes
OriginWellington
BioAndrew Kampjes enjoys getting under the hood of Rails and playing with its quirks. He also gets a sick satisfaction finding security flaws in other’s code.

TitleLittleHackMe v2.0 (Free, Tue)
AbstractTraining info
LocationTue 09 0930 @ Lateral Security Office
Duration240 mins
NameNick Breese & Niresh Singh
OriginNew Zealand and Malaysia
BioNiresh and Nick are both consultants from your friendly local Lateral Security. Niresh actually is a foreigner and Nick only sounds like one.

TitleElectronic Security Systems Basics (Paid)
AbstractTraining info
LocationTue 09 1000 @ Assurity Board Room
Duration240 mins
NameBritta / 4core
OriginNZ
BioBrittas “career”, or less cynically, her tech pedigree, consists of a mongrel mish-mash of different tech related work. From wiring up crane controls and potato baggers in Palmerston North, to commercial fibreglassing in Bunnythorpe, to doing sole IT helpdesk at a veterinary science uni department, to wind monitoring installations on farms (in NZ) and windfarm operations (not NZ), to electronic security installation work and now teaching computing with robot voices to vi people … if this list of jobs doesn’t make any sense … it can be simply summed up as a Techs life in NZ, surfing the ubiquitous skills shortages.

TitleLock Picking 101 (Paid)
AbstractTraining info
LocationTue 09 1200 @ 3C Bar & Restaurant
Duration210 mins
NameD.Roc (Derek Robson)
Origin"The Hutt", AKA Lower Hutt
BioD.Roc is the organiser of LockSport NZ, also works as a IT security type person for a government type place.

TitlePractical VoIP Hacking with Viproy (Paid)
AbstractTraining info
LocationTue 09 1300 @ Enspiral Red Room
Duration240 mins
NameFatih Ozavci
OriginSydney, AU
BioFatih Ozavci is a Security Researcher and a Senior Security Consultant with Sense of Security. He is the author of the Viproy VoIP Penetration Testing Kit and has published research and a paper about Hacking SIP Trust Relationships. Fatih has discovered several previously unknown security vulnerabilities and design and protocol flaws in VoIP environments for his customers, and analyses VoIP design and implementation flaws which helps them improve their VoIP infrastructures. His current research is based on attacking mobile VoIP clients, VoIP service level vulnerabilities, decrypting custom mobile application protocols and MITM attacks for mobile applications. Fatih has presented his VoIP research and tool at Black Hat USA’14, Def Con 22, Def Con 21, AustCert’14, Cluecon 2013 and Ruxcon 2013. Homepage : http://viproy.com/fozavci Linkedin : http://tr.linkedin.com/pub/fatih-ozavci/54/a71/a94

TitleAlly Skills Training
AbstractTraining info
LocationTue 09 1400 @ Assurity Board Room
Duration180 mins
NameLeigh Honeywell
OriginCanada
BioLeigh reboots computers and makes hackerspaces.

TitlePenetration Testing Java applications for Fun and Profit (Free)
AbstractTraining info
LocationWed 10 0900 @ Insomnia Security Meeting Room
Duration240 mins
NameDavid Jorm
OriginBrisbane, Australia
BioDavid has been involved in the security industry for the last 15 years. He currently works as a manager for Red Hat's product security team, focusing on cloud and middleware products. He has been quoted in a major newspaper as saying North Korea's nuclear program is "ready to rock".

TitleIntro to SDR and Signal Processing (Free)
AbstractTraining info
LocationWed 10 0900 @ Catalyst Training Room
Duration480 mins
NameTim Kuester
OriginMaryland USA
Bio Wow. Writing about yourself in the 3rd person is weird. Tim Kuester is a Computer Engineer living in Maryland. Over the past four years, he's worked on some pretty sweet projects involving FPGA's, microcontrollers, circuit board design, and radios. He secretly wants to write a blog like Dave Jones and Craig Heffner, but he's not cool enough to do that yet.

TitleBug Hunting for Amateur Naturalists
AbstractTraining info
LocationWed 10 0900 @ Aura Infosec Office
Duration480 mins
NameEmmanuel Law & Mike Haworth
Originunspecified
BioEmmanuel and Mike are working as legalised hackers in Aura Information Security.

TitleBootstrapping Agile Security
AbstractTraining info
LocationWed 10 0900 @ Enspiral Board Room
Duration450 mins
NameLaura Bell
OriginNew Zealand
BioWith almost a decade of experience in software development and information security, Laura specialises in bringing security practices and culture into organisations of every shape and size. Her recent research into agile security practices has generated a set of tools and processes that can enable the management of security risk without compromising innovation or speed.

TitlePassive DNS: Forensics and Analysis (Free)
AbstractTraining info
LocationWed 10 0900 @ BNZ Harbour Quays Meeting Room
Duration240 mins
NameBen April
OriginSomewhat murky.
BioBen April is the Director of Engineering at Farsight Security, Inc. Prior to joining Farsight, Ben worked eight years at Trend Micro, where he became the Americas regional manager of the Forward-looking Threat Research team. Before making the jump to security, Ben worked his way upstream hop-by-hop from a small dial-up ISP to a regional ISP to a global backbone carrier, with roles in customer support, network operations, system administration and provisioning. Ben is also a volunteer sysadmin and coder for some community security projects. Ben has presented to security conferences on four continents, covering topics like Bitcoin, NFC, operational security and infrastructure security. He has built research systems for collecting and aggregating data, from Whois and the Bitcoin block-chain to the global routing table. His current crusade is to eliminate the technical and policy barriers that impede data-sharing among white-hat security researchers. "Once the good guys can share data as effectively as the criminals, we might have a chance.

TitleConsulting Like a Boss
AbstractTraining info
LocationWed 10 0900 @ Catalyst Small Room
Duration480 mins
NameEdward Farrell, Chris Gatford
OriginAustralia... and kinda New Zealand
BioChris is a professional cat herder and his perfected the art of cat hair removal mostly from pen tester reports. Edward is a hairless cat and security sellout who splits his time between wearing boardshorts and tailored pants... he hates pants. Origin: Australia... and kinda New Zealand

TitleOSINT Training (free)
AbstractTraining info
LocationWed 10 0900 @ Auldhouse Training
Duration480 mins
NameSimon Howard
OriginWellington, New Zealand
BioSimon owns and operates security consultancy ZX Security which helps organisations inject security into their processes and systems. Simon also co-founded and helps run NZ bestest Hacker conference - Kiwicon.

TitlePractical VoIP Hacking with Viproy (Free)
AbstractTraining info
LocationWed 10 1300 @ Enspiral Red Room
Duration240 mins
NameFatih Ozavci
OriginSydney, AU
BioFatih Ozavci is a Security Researcher and a Senior Security Consultant with Sense of Security. He is the author of the Viproy VoIP Penetration Testing Kit and has published research and a paper about Hacking SIP Trust Relationships. Fatih has discovered several previously unknown security vulnerabilities and design and protocol flaws in VoIP environments for his customers, and analyses VoIP design and implementation flaws which helps them improve their VoIP infrastructures. His current research is based on attacking mobile VoIP clients, VoIP service level vulnerabilities, decrypting custom mobile application protocols and MITM attacks for mobile applications. Fatih has presented his VoIP research and tool at Black Hat USA’14, Def Con 22, Def Con 21, AustCert’14, Cluecon 2013 and Ruxcon 2013. Homepage : http://viproy.com/fozavci Linkedin : http://tr.linkedin.com/pub/fatih-ozavci/54/a71/a94

TitleLittleHackMe v2.0 (Free, Wed)
AbstractTraining info
LocationWed 10 1400 @ Meow
Duration240 mins
NameNick Breese & Niresh Singh
OriginNew Zealand and Malaysia
BioNiresh and Nick are both consultants from your friendly local Lateral Security. Niresh actually is a foreigner and Nick only sounds like one.