Black Hat DC 2010 //training
Grand Hyatt Crystal City • Jan 31 - Feb 3
A Certificate of Completion is offered for each class.
Menu by Category
Course Offerings by Category
These courses help attendees gain experience in determining whether a piece of code is malicious and how it can impact an infrastructure. Focusing on both static and dynamic techniques; trainees will expand their knowledge by using, sandboxing, binary analysis, code de-obfuscation, and low -level programming.
Advanced Malware Analysis by Nick Harbour, Mandiant 4 Day Course
Students will learn to combat sophisticated malware head-on by studying its anti-analysis techniques
Advanced Malware Deobfuscation by Jason Geffner & Scott Lambert
Learn how to manually unpack the most advanced obfuscation protections.
Building a Better Mouse Trap:
The Art of Developing Effective Intrusion Detection/Prevention Signatures
by Rohit Dhamankar & Rob King
Learn how to implement effective network intrusion prevention.
Introduction to Malware Analysis by Jason Geffner & Scott Lambert
No Source? No Symbols? No Problem.
Malware Analysis: Crash Course by MANDIANT
This introductory course is for those interested in entering the field of malicious software analysis.
Reverse Engineering with IDA Pro by Chris Eagle
Essential background material for effective reverse engineering.
Reverse Engineering Rootkits and Active Reversing by Greg Hoglund, HBGary and Rich Cummings, HBGary
This two day class will cover useful techniques and methods for incident response in the field when machines are suspected of intrusion with stealthy malware.
Reverse Engineering on Windows by Pedram Amini and Ero Carrera
This class is meant to impart cutting-edge understanding of malicious code analysis upon attendees, ultimately taking them to an advanced level of reverse engineering skills applicable to other security domains.
Understanding Stealth Malware
by Joanna Rutkowska and Alexander Tereshkin
July 25-26 only
An in-depth understanding of how advanced stealth malware works, how it interacts with the operating system, underlying hardware and network.