Ultimate Hacking: Black Hat Edition


Register Now

USA 2011 Weekend Training Session //July 30-31

USA 2011 Weekday Training Session //August 1-2


Foundstone created the e in "Hands On" security training. Designed to arm security pros with the skills to keep hackers at bay, Ultimate Hacking: Black Hat Edition is an action-packed two-day intensive class covering the latest methodologies, tools, and techniques necessary to assess and secure your connected environment. This special "Black Hat" edition is a derivative of the longer Ultimate Hacking class that is taught to the general public, the military, and many government agencies. Foundstone has taken the best content from Ultimate Hacking and created a shorter, accelerated version for Black Hat.

Ultimate Hacking: Black Hat Edition begins from a "zero-knowledge" perspective. Start by profiling your target, then learn how to identify and exploit well-known and obscure vulnerabilities in the most popular operating systems including Windows and multiple Unix flavors.

But don't just listen to us—put your skills to use and learn by doing. Foundstone challenges you with countless hands-on exercises to demonstrate your expertise as you race other students to achieve the e goal…getting root.

Topics include:

  • Assessing and Penetrating Windows® & Unix® networks and hosts
  • Enumerating information from Windows hosts
  • Linking Windows and Unix vulnerabilities for maximum impact
  • Securing Windows & Unix hosts

Why Do We Teach This Class:

Security vulnerabilities are an unfortunate, but unavoidable, part of today's computing systems. If exploited by internal or external users, these weaknesses can be catastrophic to your organization. Foundstone teaches step-by-step procedures for executing Internet, intranet, and host-level security reviews. This course is the definitive training for learning how to perform "tiger team" and attack and penetration assessments.

Foundstone instructors cover all the bases, presenting manual and scripted security-review techniques that go far beyond what automated analysis tools can do. You return to your organization with valuable knowledge, experience, and the ability to put your new skills into practice.

Who Teaches This Class:

Your instructors are simply the very best. Foundstone instructors are practicing security consultants who bring real world experiences from their hundreds of security engagements to the classroom. They have a broad range of expertise and have collectively taught thousands of students.

Dedicated to pushing boundaries and staying at the fore-front of hacking techniques and technologies, our students have said, "These guys are scary—you should lock them up!"

What to bring:

Nothing to bring. All necessary equipment will be provided including preconfigured workstations, tools and utilities.

What Do I Get?

You get more than just knowledge of the latest hacker tricks and techniques. You take home the following cool stuff:

  • Certificate of Completion
  • A copy of the internationally best selling book, "Hacking Exposed 6th Edition"
  • A cool Foundstone T-shirt, backpack, pen, and highlighter

Plus you don't need to bring anything with you to the class. You will be provided a laptop to use throughout the class as your attack platform as you put your new skills to work.

Who Should Take This Class?

If you are a system or network administrator, security personnel, auditor, and/or consultant concerned with network and system security, then you should take this course. Basic Unix and Windows competency is required for the course to be fully beneficial.


Foundstone's management team and selected staff are uniquely qualified to present this material, having performed hundreds of security assessments for Fortune 500 companies. Instructors have managed or directed the security-assessment teams at three of the Big 4 accounting firms, as well as amassed real-world experience ranging from the United States Air Force to Wall Street. Members of the instructor team authored the best-selling Hacking Exposed: Network Security Secrets & Solutions and write a weekly column for InfoWorld magazine.

Ends April 30
Ends Jun 15
Ends Jul 29