Black Hat Digital Self Defense USA 2005

Black Hat USA 2005 Main Conference Overview

Black Hat USA 2005 Briefings Speakers Black Hat USA 2005 Briefings Schedule Black Hat USA 2005 Sponsors Black Hat USA 2005 Training Black Hat USA 2005 Hotel & Venue Black Hat Registration
digital self defense

Black Hat USA Training 2005: Weekday Session
Caesars Palace Las Vegas •
July 25-26

All course materials, lunch and two coffee breaks will be provided. A Certificate of Completion will be offered for each class. See the Training Schedule.
course offerings
Weekday Session: July 25-26, 2005
New for 2005

A behind-the-scenes tour of the product evaluation process.

Black Box Bakeoffs: Evaluating Security Technology
Thomas Ptacek & Jeremy Rauch

Aggressive hands-on course. Register early- this class usually sells out.

Hacking by Numbers: Bootcamp
The weekday session is sold out but seats are still available on the weekend session.

Ninja level. Sensepost's Bootcamp Edition class experience helpful.

Hacking by Numbers: Combat


The definitive training regimen for assessing and securing your networks.

Ultimate Hacking: Black Hat Edition


In depth coverage of current security topics. Not for Beginners.

Ultimate Hacking: Expert

Developed by the co-authors of "Web Hacking: Attacks and Defense" and "HackNotes: Linux and Unix Security". This class is not for the faint of heart.

Web Applications: Attacks & Defense-Advanced Edition
Saumil Udayan Shah

New for 2005

If you are concerned with the security of web applications and the insecurity they introduce to your back end information systems this is the workshop for you.

Web Application (In)security
Special Ops Security & NGS Software

Return to the top of the page

Intense course encompassing binary analysis, reverse engineering and bug finding.

Analyzing Software for Security Vulnerabilities
Halvar Flake, Black Hat

Created and taught by the founder of Root-kit.

Aspects of Offensive Root-kit Technology
Greg Hoglund & Jamie Butler

New for 2005

Designed to teach how exploits affect the targeted system, the effects can be monitored in real-time, and response to the attack can be largely automated

Dynamic Defense: The Theory and Practice of Automating Attack Detection and Response
Dominique Brezinski, Black Hat


For those who wish to enter the world of malicious code analysis via reverse engineering.

Intermediate Malicious Code Analysis
Scott A. Lambert and Pedram Amini

New for 2005

Essential background material for effective reverse engineering.

Reverse Engineering with IDA Pro
Chris Eagle

Return to the top of the page



This course is a new offering with very limited seats.

Digital Investigations: Practical Digital Forensic Analysis
the Grugq

A comprehensive course for investigating the suspected use of digital steganography

Discover the Hidden: Steganography Investigator Training
WetStone Technologies

New for 2005

Cutting edge new class on honeypot technology.

Hands on Honeypot Technology
Thorsten Holz and Maximillian Dornseif

Return to the top of the page



This course is the first of its kind and focuses entirely on hardware hacking.

Hands-On Hardware Hacking and Reverse Engineering
Techniques: Black Hat Edition

Joe Grand

Return to the top of the page
Information Security

Earn NSA Certification.

NSA InfoSec Assessment Methodology Course (IAM) -Level 1
Security Horizon

The followup course to the IAM. Earn NSA certification.

NSA InfoSec Evaluation Methodology (IEM) - Level 2
Security Horizon
The weekday session is sold out but seats are still available on the weekend session.

Earn OPSA Certification.
Return to the top of the page

A practical, step-by-step approach to securing an entire organization.

Enterprise Security From Day 1 to Completion:
A Practical Approach to Developing an Information Security Program

Chris Conacher, Black Hat


A new addition to the popular Hacking By Numbers series.

Hacking by Numbers: Chief of Staff

Return to the top of the page
Systems Administration

This class has been re-designed to contain all-new Windows 2003 content.

Microsoft Ninjitsu: Securely Deploying MS Technologies
Timothy Mullen

Taught by one of the leadiing experts in Linux security & the author of Bastille Linux

Securing Solaris and Locking Down Linux
Jay Beale

Return to the top of the page


New for 2005

Discover flaws in database security and effectively develop strategies to keep attackers out

Advanced Database Security Assessment
NGS Software

Extremely popular and intense hands-on course.

Infrastructure Attacktecs™ & Defentecs™: Hacking Cisco Networks
Steve Dugan

A new hands-on course offering from the creator of Hacking Cisco Networks

Infrastructure Attacktecs™ & Defentecs™: Cisco Voice Over IP
Steve Dugan & Rodney Thayer


Wireless Security Class... Hot!

Invisible Network, Invisible Risk
Adam Laurie

Return to the top of the page

REGISTER NOW to assure a seat in the class of your choice.

briefings hotel

Attend the Briefings, July 27-28, 2005 immediately following the Training. The Briefings will consist of four different tracks over two days.

Hotel & Venue information for Black Hat US 2005 Briefings and Training. The show will be held at the Caesars Palace in Las Vegas, NV USA.

Black Hat Logo
(c) 1996-2007 Black Hat