Black Hat DC 2010 //training
Hyatt Regency Crystal City • Jan 31 - Feb 1
Complete List of Black Hat DC 2010 Training Courses
Black Hat DC 2010 brings together the best minds in security to define tomorrow’s information security landscape.
Registrants are notified when courses are chosen for cancellation; this training list reflects all course availabilities and is updated regularly.
Designing Secure Protocols and Intercepting Secure Communication
// Moxie Marlinspike
This is a new and special training that covers both designing and attacking secure protocols. Attendees will learn the fundamentals of how to design a secure protocol, and be armed with the knowledge of how to evaluate the security of and discover weaknesses in existing protocols.
Detecting & Mitigating Attacks Using Your Network Infrastructure
// John Stuppi, Cisco Systems, Joseph Karpenko, Cisco Systems & Tim Sammut, Cisco Systems
Learn leading network security practices from experts who develop these techniques and put them to practical use.
Finding Security Bugs in Closed-source Software: Advanced
// Halvar Flake, Zynamics
Intense course encompassing binary analysis, reverse engineering and bug finding.
Hacking by Numbers: Bootcamp
Novice level. A highly practical course that teaches method-based hacker thinking, skills and techniques.
This course is the first of its kind and focuses entirely on hardware hacking.
The IDA Pro Class: Reverse Engineering with IDA Pro
// Chris Eagle
Essential background material for effective reverse engineering.
Incident Response: Black Hat Edition
// Dan McWhorter, MANDIANT
Specifically designed for information security professionals and analysts who respond to computer security incidents.
Information Assurance Officer (IAO) Course (CNSS-4014E) Certified
// Information Assurance Associates (IA2)
Very intense, highly concentrated, non-technical professional training necessary to achieve the fundamental knowledge needed to define, design, integrate and manage information system security policies, processes, practices, and procedures within federal interest information systems and networks.
Mac Hacking Class
// Vincenzo Iozzo & Dino Dai Zovi
The aim of this class is to provide the student with all the skills needed in order to fully perform research on this OS. Specifically how to write payloads, what are the tools needed to perform research and all the hidden oddities of OS X which other UNIX-based systems don’t have.
Secure the Human
// Lance Spitzner, Honeytech
Everything you need to plan, deploy and maintain a successful awareness and training program.
// HD Moore
Using a combination of new tools and lesser-known techniques, attendees will learn how hackers compromise systems without depending on standard exploits.
TCP/IP Weapons School 2.0
// Richard Bejtlich, TaoSecurity
Learn how networks can be abused and subverted, while analyzing the attacks, methods, and traffic that make it happen.
Ultimate Hacking: Wireless
// Brad Antoniewicz, Foundstone
Foundstone's Ultimate Hacking: Wireless class takes an in-depth look at current attacks against wireless networks. The hands-on, Linux-based class starts off with an overview of the IEEE 802.11 protocol then dives deep into hardcore attacks used in the real world.
Web Application (in)Security
// NGS Software
If you are concerned with the security of web applications and the insecurity they introduce to your back end information systems this is the workshop for you.