RSS feed logo header graphic

Black Hat USA 2008 Training

Caesars Palace Las Vegas • August 2-7

Ultimate Hacking: Black Hat Edition

Foundstone

registration button

Overview

Foundstone created the ultimate in “Hands On” security training. Designed to arm security pros with the skills to keep hackers at bay, Ultimate Hacking: Black Hat Edition is an action-packed two-day intensive class covering the latest methodologies, tools, and techniques necessary to assess and secure your connected environment. This special “Black Hat” edition is a derivative of the longer Ultimate Hacking class that is taught to the general public, the military, and many government agencies. Foundstone has taken the best content from Ultimate Hacking and created a shorter, accelerated version for Black Hat.

Ultimate Hacking: Black Hat Edition begins from a “zero-knowledge” perspective. Start by profiling your target, then learn how to identify and exploit well-known and obscure vulnerabilities in the most popular operating systems including Windows and multiple Unix flavors.

But don’t just listen to us—put your skills to use and learn by doing. Foundstone challenges you with countless hands-on exercises to demonstrate your expertise as you race other students to achieve the ultimate goal…getting root.

Topics include:

  • Assessing and Ppenetrating Windows® & Unix® networks and hosts
  • Enumerating information from Windows hosts
  • Linking Windows and Unix vulnerabilities for maximum impact
  • Securing Windows & Unix hosts

Why Do We Teach This Class:

Security vulnerabilities are an unfortunate, but unavoidable, part of today's computing systems. If exploited by internal or external users, these weaknesses can be catastrophic to your organization. Foundstone teaches step-by-step procedures for executing Internet, intranet, and host-level security reviews. This course is the definitive training for learning how to perform "tiger team" and attack and penetration assessments.

Foundstone instructors cover all the bases, presenting manual and scripted security-review techniques that go far beyond what automated analysis tools can do. You return to your organization with valuable knowledge, experience, and the ability to put your new skills into practice.

Who Teaches This Class:

Your instructors are simply the very best. Foundstone instructors are practicing security consultants who bring real world experiences from their hundreds of security engagements to the classroom. They have a broad range of expertise and have collectively taught thousands of students.

Dedicated to pushing boundaries and staying at the fore-front of hacking techniques and technologies, our students have said, “These guys are scary—you should lock them up!”

What Do I Get?

You get more than just knowledge of the latest hacker tricks and techniques. You take home the following cool stuff:

  • Certificate of Completion
  • A copy of the internationally best selling book, "Hacking Exposed 5th Edition"
  • A cool Foundstone T-shirt
  • A bootable BackTrack(tm) distribution - BackTrack is the Top rated Linux live distribution focused on penetration testing. The merging of two very popular distributions (Whax and Auditor Security Collection) has catapulted BackTrack to the #1 spot on the "Top 100 Network Security Tools" list - http://sectools.org.!

Plus you don’t need to bring anything with you to the class. You will be provided a laptop to use throughout the class as your attack platform as you put your new skills to work.

Who Should Take This Class?

If you are a system or network administrator, security personnel, auditor, and/or consultant concerned with network and system security, then you should take this course. Basic Unix and Windows competency is required for the course to be fully beneficial.

Trainer:

Foundstone's management team and selected staff are uniquely qualified to present this material, having performed hundreds of security assessments for Fortune 500 companies. Instructors have managed or directed the security-assessment teams at three of the Big 5 accounting firms, as well as amassed real-world experience ranging from the United States Air Force to Wall Street. Members of the instructor team authored the best-selling Hacking Exposed: Network Security Secrets & Solutions and write a weekly column for InfoWorld magazine. They are also frequent speakers at industry conferences such as NetWorld+Interop, Usenix, and the Black Hat Briefings.

registration button




Early:
Ends May 1

Regular:
Ends July 1

Late:
Ends: July 31

Onsite:
Begins: August 1

USD 2000

USD 2200

USD 2400

USD 2700

1997-2009 Black Hat ™