RSS feed logo header graphic
am

Black Hat Europe 2008 Training

Moevenpick Hotel Amsterdam City Centre,
The Netherlands • 25-26 March 2008

All course materials, lunch and two coffee breaks will be provided.
A Certificate of Completion will be offered for each class.
See the Training Schedule.





Course Offerings


New security threats to governments and businessess emerge hourly, from sophisticated wireless attacks to remotely organized Bot armies. Black Hat Europe brings together the best minds in computer and network security to define tomorrow’s information security landscape.

Black Hat returns to Europe with an expanded program with six full tracks, more trainings and more intense, comprehensive presentations on the hottest topics in information security. Please join us for the very best technical security conference on the European continent.



To ensure availability in the training of your choice.



Auditing & Assessment




Breakable: Secure Your Oracle Servers By Breaking Into Them
David Litchfield, Mark Litchfield

Never has the need for understanding Oracle database security been so great as it is today as the boundaries between networks become less defined and web applications provide direct inroads through any firewalls and into the backend. This course will teach you how to hack into Oracle database servers; only by truly grasping the mechanics of attacks can a complete and effective defense be built.

Web Application (In)security
NGS Software

If you are concerned with the security of web applications and the insecurity they introduce to your back end information systems this is the workshop for you.

Hacking by Numbers: Bootcamp
SensePost

Novice level. A highly practical course that teaches method-based hacker thinking, skills and techniques.




Development




Reverse Engineering on Windows: Application in Malicious Code Analysis
Pedram Amini & Ero Carrera

Learn to reverse engineer real-world virus samples.







Hardware




Side Channel Analysis and Countermeasures
Riscure

Learn how to protect embedded and smart card technology against side channel analysis.







Rootkits




Understanding Stealth Malware
Joanna Rutkowska and Alexander Tereshkin

Learn and understand contemporary malware techniques.




Systems Administration




Microsoft Ninjitsu: Black Belt Edition
Timothy Mullen, Jim Harrison & Dr. Thomas Shinder

This one-of-a-kind training course will arm attendees with the skills needed to design, deploy, maintain and secure even the most sophisticated Microsoft infrastructures. This "special edition" course will also include the development and design of ISA Server DMZ configurations and deployments to further secure your Microsoft installations




Technical




Exploits 101
Allen Harper

Working through lab examples and real world vulnerabilities to take you to the next level

Invisible Network, Invisible Risk
Adam Laurie

Wireless Security Class... Hot!

To ensure availability in the training of your choice.



Briefings

Attend the Briefings, 27-28 March 2008 immediately following the Training. The Briefings will consist of four different tracks over two days.




westin hotel dc picture

Venue

Hotel & Venue information for Black Hat Europe 2008 Briefings and Training. The show will be held at the Moevenpick Hotel Amsterdam City Centre, the Netherlands

1997-2008 Black Hat ™