Black Hat DC 2011 //training

Hyatt Regency Crystal City • Jan 16 - 17


Register Now for Black Hat DC 2011 //all training


Complete List of Black Hat DC 2011 Training Courses

Black Hat DC 2011 brings together the best minds in security to define tomorrow's information security landscape.

NOTICE:

Registrants are notified when courses are chosen for cancellation; this training list reflects all course availabilities and is updated regularly.


LEGEND:

Weekday Course Weekend Course
4-Day Course Course Cancelled!

( NOTICE: Registrants are notified when courses are chosen for cancellation; this training list reflects all course availabilities and is updated regularly. )




Database Breach Investigations: Oracle Edition //NEW 2011
// David Litchfield

This training course will teach students the tricks and techniques hackers use to break into Oracle database servers and then how to peform a database security breach investigation covering evidence collection, collation and analysis using V3RITY for Oracle, the world's first database specific forensics and breach investigation tool.


CISSP® Boot Camp (Four Day Course - Jan 16-19)
// Shon Harris

This Logical Security course trains students in all areas of the security Common Body of Knowledge (CBK). Using this course, students prepare for the exam, while at the same time obtaining essential security knowledge that can be immediately used to improve organizational security.


Cyber Network Defense Bootcamp //NEW 2011
// Adam Meyers

A two day workshop focusing on the progression from incident identification, investigation and malware analysis to explaining to management why it matters. In other words how to go from geek to sleek.


Designing Secure Protocols and Intercepting Secure Communication
// Moxie Marlinspike

This is a new and special training that covers both designing and attacking secure protocols. Attendees will learn the fundamentals of how to design a secure protocol, and be armed with the knowledge of how to evaluate the security of and discover weaknesses in existing protocols.


Digital Intelligence Gathering Using Maltego //NEW 2011
// Paterva

Unlock the true potential and raw power of Maltego. Join us and we’ll show you how to navigate and map the Internet’s darkest rivers...


Information Assurance Officer (IAO) Course (CNSS-4014E) Certified
// Information Assurance Associates (IA2)

Very intense, highly concentrated, non-technical professional training necessary to achieve the fundamental knowledge needed to define, design, integrate and manage information system security policies, processes, practices, and procedures within federal interest information systems and networks.


Real World Security: Attack, Defend, Repel //NEW 2011
// Peak Security

An intensive 2 day course/exercise for the security professional that wants to up the ante on their current skill sets in offensive and defensive security. Learn new tactics and receive guidance from expert instructors while you test yourself in a team vs team environment. Hands on and technical.


Tactical Exploitation
// Val Smith

Using a combination of new tools and lesser-known techniques, attendees will learn how hackers compromise systems without depending on standard exploits.


TCP/IP Weapons School 3.0 //NEW 2011
// Richard Bejtlich, TaoSecurity

Use the network to your advantage while building incident detection and response skills to counter advanced and targeted threats.


Virtualization for Incident Responders //NEW 2011
// Eric Fiterman - Methodvue

Principles and techniques for recovering evidence from virtualized systems and cloud environments - this course is intended for information security personnel who are responsible for handling incidents involving virtual infrastructure, cloud service providers, or desktop virtualization platforms.


Windows Physical Memory Acquisition and Analysis //NEW 2011
// Matthieu Suiche

Want to learn all about memory dumps, including how they work and deep analysis using Windbg.