Black Hat DC 2011 //training
Hyatt Regency Crystal City • Jan 16 - 17
Complete List of Black Hat DC 2011 Training Courses
Black Hat DC 2011 brings together the best minds in security to define tomorrow's information security landscape.
Registrants are notified when courses are chosen for cancellation; this training list reflects all course availabilities and is updated regularly.
|Weekday Course||Weekend Course|
|4-Day Course||Course Cancelled!|
|(||NOTICE: Registrants are notified when courses are chosen for cancellation; this training list reflects all course availabilities and is updated regularly.||)|
This training course will teach students the tricks and techniques hackers use to break into Oracle database servers and then how to peform a database security breach investigation covering evidence collection, collation and analysis using V3RITY for Oracle, the world's first database specific forensics and breach investigation tool.
CISSP® Boot Camp
(Four Day Course - Jan 16-19)
// Shon Harris
This Logical Security course trains students in all areas of the security Common Body of Knowledge (CBK). Using this course, students prepare for the exam, while at the same time obtaining essential security knowledge that can be immediately used to improve organizational security.
A two day workshop focusing on the progression from incident identification, investigation and malware analysis to explaining to management why it matters. In other words how to go from geek to sleek.
Designing Secure Protocols and Intercepting Secure Communication
// Moxie Marlinspike
This is a new and special training that covers both designing and attacking secure protocols. Attendees will learn the fundamentals of how to design a secure protocol, and be armed with the knowledge of how to evaluate the security of and discover weaknesses in existing protocols.
Unlock the true potential and raw power of Maltego. Join us and we’ll show you how to navigate and map the Internet’s darkest rivers...
Information Assurance Officer (IAO) Course (CNSS-4014E) Certified
// Information Assurance Associates (IA2)
Very intense, highly concentrated, non-technical professional training necessary to achieve the fundamental knowledge needed to define, design, integrate and manage information system security policies, processes, practices, and procedures within federal interest information systems and networks.
An intensive 2 day course/exercise for the security professional that wants to up the ante on their current skill sets in offensive and defensive security. Learn new tactics and receive guidance from expert instructors while you test yourself in a team vs team environment. Hands on and technical.
// Val Smith
Using a combination of new tools and lesser-known techniques, attendees will learn how hackers compromise systems without depending on standard exploits.
Use the network to your advantage while building incident detection and response skills to counter advanced and targeted threats.
Principles and techniques for recovering evidence from virtualized systems and cloud environments - this course is intended for information security personnel who are responsible for handling incidents involving virtual infrastructure, cloud service providers, or desktop virtualization platforms.
Want to learn all about memory dumps, including how they work and deep analysis using Windbg.