Black Hat Digital Self Defense USA 2004
Trainiing

Note: if the class is overfilled, then you will be wait-listed. You will be contacted should this occur.

training

Black Hat Seattle Training 2005
Red Lion Hotel on Fifth Avenue • October 10-11, 2005

Course Length: 2 days

Cost: US $2000 on or before October 1, 2005 or US $2200 after October 1, 2005
All course materials, lunch and two coffee breaks will be provided. NOTE: this is a two day course. A Certificate of Completion will be offered.

CLOSED

Two Day Course

October 10-11

Advanced Database Security Assessment

Kev Dunn, NGS Software & Marcus Pinto, NGS Software

What to bring:
Basic networking knowledge is required and a familiarization with database concepts would be beneficial.  Experience or knowledge of specific database solutions is desirable, though not essential in order to complete the course satisfactorily. 

Participants are requested to bring their own laptops installed with a either Microsoft Windows 2000 or Windows XP, fully patched. Laptops should also be equipped with a wireless network card.

Databases contain your company’s most sensitive information that you don’t want falling into the wrong hands…

Computer networks are built to support business functionality and beyond communication the result of business is data. The data important to your business is your company’s digital assets, it needs organizing, maintaining and above all protecting from malicious attackers. The modern corporate enterprise contains database solutions used to take care of data such as client credit card numbers, customer names and addresses—even the entire employee pay roll. Ensuring that this data can’t get into the hands of unauthorized employees, your competitors or punk kids trading card numbers on IRC, means that you need to recognize and secure it from this threat. The evolution of security training has shown us that the most effective way to learn about security is by learning from the people that know how to attack your systems. By understanding the threat from the attacker’s perspective, you can develop effective assessment methodologies and ultimately secure what really matters from ever increasing threats.

NGSSoftware (http://www.ngssoftware.com) are offering the chance to benefit from the experience of its consultants and award winning research team. This course teaches how to recognize the insecurities present within common database systems and how these flaws can leave you wide open to attack. It is tailored to teach security consultants, database administrators and IT professionals how hackers discover and exploit vulnerabilities to gain access to your data and further penetrate internal networks.  By learning these techniques, we can discover the flaws for ourselves and effectively develop strategies to keep attackers out.

Who should take this course:
Internal security teams, database administrators and security consultants concerned with the insecurity of database systems, the exposure they have to network and data compromises, and assessment techniques used to close security holes. This 2 day course qualifies for 16 hours of CPE for CISSP/SSCP

In addition to course / delegate introduction and safety brief requirements, the course is split into 10 sections over a two days period:

  • Fundamental Database Concepts
  • Popular Industry Database Solutions
  • Database Integration Into Business Solutions
  • Building a Database Assessment Toolkit
  • Database Enumeration: Unauthenticated
  • Database Enumeration: Authenticated
  • Identifying Database Vulnerabilities
  • Exploiting Flaws to Gain Control
  • Developing Your Assessment Methodology
  • Database Assessment Flag Challenge

Upon completing this course, delegates should be able to understand:

  • The fundamental concepts behind database systems
  • Key components within a database deployment
  • The integration of databases into business solutions
  • The process of thorough database assessment, including tools and methodologies
  • Techniques used by hackers to exploit database flaws and vulnerabilities
  • Practical assessment / attack vector considerations, through hands-on experience

Advanced Database Security Assessment has been jammed full of assessment techniques from world renowned database experts! NGS's own researchers David Litchfield, Chris Anley, John Heasman and Bill Grindlay have joined the course authors to provide content for this BlackHat training session. These four database experts are soon to release an authoritative text: The Database Hackers Handbook and have collaborated once again to ensure the NGS BlackHat training is the best security tuition available. SQL Injection and database security guru Chris Anley has personally developed lab exercises to further push the boundaries of database security training... Seats are limited so don't miss out!

ISC2 CISSP/SCCP CPE Credits
Students are eligible to receive 16 Continuing Professional Education (CPE) credits upon completion of class. Black Hat will automatically forward your information to ISC2.

Course Length: 2 days

Cost: US $2000 on or before October 1, 2005 or US $2200 after October 1, 2005
All course materials, lunch and two coffee breaks will be provided.
NOTE: this is a two day course. A Black Hat Certificate of Completion will be offered. You must provide your own laptop.

CLOSED

Trainer:

Kev Dunn
(UK CHECK Team Leader) Senior Security Consultant, NGS Software

Kev is a Senior Consultant for NGSSoftware, responsible for conducting penetration testing and security assessments of customer networks across many different operating environments. Providing consultancy advice for a wide selection of high profile clients has ensured detailed exposure, and assessment of database and network architectures common place within the world’s financial and technology industries. His specialist knowledge combined with hands-on consultancy experience of backend database systems and network infrastructure has lead to him being invited to design, author and present a comprehensive list of training courses for NGS.

Before joining NGS, Kev worked as a Network Vulnerability Analyst for the British Ministry of Defence, securing Military IT infrastructures and providing advice to protect government digital assets. During this time he developed in-house network security training programs that are still in use today, for the education of personnel and to raise the overall level of awareness for network security practices. 

Marcus Pinto
(UK CHECK Team Leader), Principal Consultant, NGS Software

Marcus Pinto is a Principal Consultant for NGS Software. Marcus originally studied mathematical modelling and holds an MPhys in Experimental and Theoretical Physics from Cambridge University. Current and prior working experience has lead to over 5 years’ experience in a variety of customer architectures, largely centered around web applications and 2-tier information systems. This experience has been gained in diverse areas such as British National Critical Infrastructure, high street banks and large software houses, many of whom have the most demanding security requirements of any company. The role at NGS has included research projects into specific products, including Sybase ASA Anywhere, and has lead to a hands-on background in penetrating and securing most of the large database systems found on networks in differing real-world environments.

Prior to NGS, Marcus worked as a security advisor for a 30-man team responsible for assessing and securing Military networks for the British Ministry of Defence. This included running an internal training programme and assessing personnel within the team, as well as an overall responsibility for providing knowledge transfer. Ultimately, team members were passed through a penetration “assault course” to ensure team members had reached the necessary ability to lead assessments on Government networks.

Black Hat Logo
(c) 1996-2007 Black Hat