rss feed link header graphic

Black Hat DC 2009 Training Index

Hyatt Regency Crystal City • February 16-17

All course materials, lunch and two coffee breaks will be provided.
A Certificate of Completion will be offered for each class.

Course Offerings

To be sure of a seat in the training of your choice, register now.



Auditing and Assessment

capitol dome at night

Hacking by Numbers: Bootcamp by SensePost

Novice level. A highly practical course that teaches method-based hacker thinking, skills and techniques.

Hacking by Numbers: Combat Training by SensePost

Advanced level. This course is all hack, no talk.

Development

Analyzing Software for Security Vulnerabilities by Halvar Flake

Intense course encompassing binary analysis, reverse engineering and bug finding.

Reverse Engineering with IDA Pro by Chris Eagle

Essential background material for effective reverse engineering.

Hardware

Hands-On Hardware Hacking and Reverse Engineering Techniques by Joe Grand

This course focuses entirely on hardware hacking and techniques to defeat the security of hardware products.


Technical

Advanced Memory Forensic in Incident Response by Jamie Butler, MANDIANT

This course was designed for students who have a basic understanding of programming as well as more advanced students wishing to apply their knowledge to memory forensics.

Cryptographic Primitive (Asymmetrical) by Andrew Lindell

In this course, participants will gain an in-depth understanding of how cryptographic primitives are constructed and broken.

Detecting and Mitigating Attacks Using Your Network Infrastructure by Cisco Systems

Learn leading network security practices from experts who develop these techniques and put them to practical use.

Exploit Laboratory by Saumil Shah

The Exploit Laboratory is an intense hands-on class for those wishing to dive into vulnerability analysis and exploit writing.

Reverse Engineering on Windows by Pedram Amini and Ero Carrera

The course will cover the basics of x86 assembly and pattern recognition, Windows process memory layout, tools of the trade (such as IDA Pro and OllyDbg), the PE file format and basic exploitation methodologies abused by worms to penetrate a target system (stack/heap overflows).

Tactical Exploitation with HD Moore by MetaSpolit, LLC.

This talk introduces a tactical approach that does not rely on exploiting known vulnerabilities. Using combination of new tools and obscure techniques, I will walk through the process of compromising an organization without the use of normal exploit code.

TCP/IP Weapons School 2.0 by Richard Bejtlich

Brand new for 2009, this hands-on, lab-centric class by Richard Bejtlich focuses on collection, detection, escalation, and response for digital intrusions.

Understanding and Deploying DNSSEC by Paul Wouters and Patrick Nauber

This course will teach the theory of DNSSEC as required from an operational perspective. It will teach you how to use the available DNSSEC software. How to create and publish a DNSSEC signed domain. And importantly, how to deal with the DNSSEC key management, the core complexity of using DNSSEC. And how to configure DNS resolvers to take advantage of DNSSEC with minimal infrastructure changes.

To be sure of a seat in the training of your choice, register now.


image

Hotel

Hotel & Venue information for Black Hat DC 2009 Briefings and Training.
The conference will be held at the Hyatt Regency Crystal City in Arlington, VA.




Black Hat Webcasts


Black Hat Social






About Black Hat | Privacy Policy | Sponsorship Inquiry | DEFCON | Black Hat Main RSS Feed