Black Hat Federal 2003

Black Hat Federal 2003 Overview

Black Hat Federal 2003 Call for Papers Black Hat Federal 2003 Speakers Black Hat Federal 2003 Briefings Schedule Black Hat Federal 2003 Sponsors Black Hat Federal 2003 Training Black Hat Federal 2003 Hotel & Venue Black Hat Federal 2003 Registration
digital self defense
Black Hat Federal Training 2003
The Sheraton Premiere at Tyson's Corner, September 29-30, 2003

All course materials, lunch and two coffee breaks will be provided. A Certificate of Completion will be offered for each class.

This schedule applies to both days and all training.
Course materials are distributed in the classroom.
Please make sure your training admission ticket matches the class that you are attending.
08:00 - 09:00
Registration & Continental Breakfast
Registration Desk is located at Pavilion 21
Training Sessions Begin
Please see below for respective classroom locations
10:30 - 10:45
Coffee Service
Will be held in the immediate vicinity of the classrooms.
12:30 - 14:00
16:00 - 16:15
Coffee Service
Will be held in the immediate vicinity of the classrooms.
Training Sessions End
Two Day Courses
Monday-Tuesday, September 29-30, 2003


Level 1, Conference Room 8

Analyzing Software for Security Vulnerabilities
Halvar Flake, Black Hat

Mezzanine Level, Room 1

Created and taught by the founder of Root-kit.

Aspects of Offensive Root-kit Technology
Greg Hoglund & Jamie Butler

Mezzanine Level, Room 4

Design enterprise applications to minimize risk.

Network Application Design & Secure Implementation
Drew Miller

Return to the top of the page

Information Security

Mezzanine Level, Room 2

Earn NSA Certification.

NSA InfoSec Assessment Methodology Course
Security Horizon

Return to the top of the page
Level 1, Conference Room 6

Newly expanded hands on forensics class.

Forensics Tools and Processes for Windows XP and Windows 2003 Server Platforms
Larry Leibrock, Ph.D

Return to the top of the page


Level 1, Conference Room 9

Enterprise Security From Day 1 to Completion:
A Practical Approach to Developing an Information Security Program

Chris Conacher, Black Hat Consulting
Return to the top of the page


Mezzanine Level, Room 3

Aggressive hands-on course. Register early- this class usually sells out.

Hacking by Numbers

Level 1, Conference Room 5

In depth coverage of current security topics. Not for Beginners.

Ultimate Hacking: Expert

Return to the top of the page

Students are eligible to receive 16 Continuing Professional Education (CPE) credits upon completion of class. Black Hat will automatically forward your information to ISC2. If you would like to take part in this service, please complete the CPE credit form at the registration desk.
Black Hat Logo
(c) 1996-2007 Black Hat