Black Hat Digital Self Defense USA 2005

Black Hat Federal 2006

Black Hat Federal 2006 Call for Papers Black Hat Federal 2006 Briefings Speakers Black Hat Federal 2006 Briefings Schedule Black Hat Federal 2006 Sponsors Black Hat Federal 2006 Training Black Hat Federal 2006 Hotel & Venue Black Hat Registration
training
digital self defense
details

Black Hat Federal Training 2006
Sheraton Crystal City • January 23-24


All course materials, lunch and two coffee breaks will be provided. A Certificate of Completion will be offered for each class. See the Training Schedule.
course offerings
January 23-24, 2006
Closed

Ninja level. Sensepost's Bootcamp Edition class experience helpful.

Hacking by Numbers: Combat
SensePost

Return to the top of the page
Development

Intense course encompassing binary analysis, reverse engineering and bug finding.

Analyzing Software for Security Vulnerabilities
Halvar Flake, Black Hat

Created and taught by the founder of Root-kit.

Aspects of Offensive Root-kit Technology
Greg Hoglund & Jamie Butler

Closed

New course offering from the creator of BugScan

Binary Static Analysis: From the Inside-Out
Matt Hargett

New for 2005

Essential background material for effective reverse engineering.

Reverse Engineering with IDA Pro
Chris Eagle

Return to the top of the page

Forensics


This course is a new offering with very limited seats.

Digital Investigations: Practical Digital Forensic Analysis
the Grugq

Return to the top of the page

Hardware

Closed

This course is the first of its kind and focuses entirely on hardware hacking.

Hands-On Hardware Hacking and Reverse Engineering
Techniques: Black Hat Edition

Joe Grand

Return to the top of the page
Managerial
Closed

A practical, step-by-step approach to securing an entire organization.

Enterprise Security From Day 1 to Completion:
A Practical Approach to Developing an Information Security Program

Chris Conacher, Black Hat

Return to the top of the page
Systems Administration
Closed Microsoft Ninjitsu: Securely Deploying MS Technologies
Timothy Mullen
Return to the top of the page

Technical

Closed

Discover flaws in database security and effectively develop strategies to keep attackers out

Advanced Database Security Assessment
NGS Software

Closed

Learn how to expose the inner mechanisms of exploits and how they work. The class is highly hands-on and very lab intensive.

The Exploit Laboratory - Buffer Overflows For Beginners
Saumil Udayan Shah

Return to the top of the page

REGISTER NOW to assure a seat in the class of your choice.



briefings hotel

Attend the Briefings, January 25-26, 2006 immediately following the Training. The Briefings will consist of two tracks over two days.

Hotel & Venue information for Black Hat Federal 2006 Briefings and Training. The show will be held at the Sheraton Crystal City in Washington DC

Black Hat Logo
(c) 1996-2007 Black Hat