Black Hat Abu Dhabi 2010 is set to bring together the best minds in security to define tomorrow’s information security landscape in the Middle-East Region. This year's training courses offer the essential knowledge and skills to defend your enterprise against today's threats.
|(||NOTICE: Registrants are notified when courses are chosen for cancellation; this training list reflects all course availabilities and is updated regularly.||)|
Cyber Network Defense Bootcamp
// Adam Meyers
A two day workshop focusing on the progression from incident identification, investigation and malware analysis to explaining to management why it matters. In other words how to go from geek to sleek.
Designing Secure Protocols and Intercepting Secure Communication
// Moxie Marlinspike
This is a new and special training that covers both designing and attacking secure protocols. Attendees will learn the fundamentals of how to design a secure protocol, and be armed with the knowledge of how to evaluate the security of and discover weaknesses in existing protocols.
Detecting & Mitigating Attacks Using Your Network Infrastructure
// Cisco Systems (Randy Ivener, Joseph Karpenko & Tim Sammut)
Learn leading network security practices from experts who develop these techniques and put them to practical use.
Hacking by Numbers: Bootcamp
Novice level. A highly practical course that teaches method-based hacker thinking, skills and techniques.
Real World Security: Attack, Defend, Repel
An intensive 2 day course/exercise for the security professional that wants to up the ante on their current skill sets in offensive and defensive security. Learn new tactics and receive guidance from expert instructors while you test yourself in a team vs team environment. Hands on and technical.
//Aperture Labs Ltd. (Adam Laurie)
This workshop is geared towards security professionals whose duties and responsibilities include guiding security decisions for whole departments or even entire companies.
The Web Application Hacker's Handbook - Live Edition //NEW 2010
//Dafydd Stuttard & Marcus Pinto
This course follows the chapters of The Web Application Hacker’s Handbook, with strong focus on practical attacks and methods and concludes with a Capture the Flag contest.
TCP/IP Weapons School 2.0 SOLD OUT
//Richard Bejtlich, TaoSecurity
Learn how networks can be abused and subverted, while analyzing the attacks, methods, and traffic that make it happen. This is the last chance to take TCP/IP 2.0... 3.0 will debut in 2011.
Ultimate Hacking: Wireless
This course delivers hands on application of Foundstone's wireless hacking methodology. This course takes you from configuring interfaces to the latest attacks.