Black Hat USA Registration Black Hat USA Registration Black Hat USA Briefings Black Hat USA Briefings Black Hat USA Training Black Hat USA Training Black Hat USA Schedule Black Hat USA Schedule Black Hat USA Sponsors Black Hat USA Sponsors Black Hat  USA Special Events Black Hat  USA Special Events Black Hat USA Venue Black Hat USA Venue

On This Page

Ultimate Hacking

Foundstone | July 27-28 & 29-30



Ends May 31



Ends July 24



Ends July 30


Foundstone pioneered "Hands On" security training. Designed to arm security pros with the skills to keep hackers at bay, Ultimate Hacking: Black Hat Edition is an action-packed two-day intensive class covering the latest methodologies, tools, and techniques necessary to assess and secure your connected environment. This special "Black Hat" edition is a derivative of the longer Ultimate Hacking class that is taught to the general public, the military, and many government agencies. Foundstone has taken the best content from Ultimate Hacking and created a shorter, accelerated version for Black Hat.

Ultimate Hacking: Black Hat Edition begins from a "zero-knowledge" perspective. Start by profiling your target, then learn how to identify and exploit well-known and obscure vulnerabilities in the most popular operating systems including Windows and multiple Unix flavors.

But don't just listen to us—put your skills to use and learn by doing. Foundstone challenges you with countless hands-on exercises to demonstrate your expertise as you race other students to achieve the goal…getting root.

Oh, and we'll be giving away a free iPad with Retina Display at the end of each class. So don't miss your chance to win big in Vegas with Foundstone's Ultimate Hacking course.

Topics include:


Security vulnerabilities are an unfortunate, but unavoidable, part of today's computing systems. If exploited by internal or external users, these weaknesses can be catastrophic to your organization. Foundstone teaches step-by-step procedures for executing Internet, intranet, and host-level security reviews. This course is the definitive training for learning how to perform "tiger team" and attack and penetration assessments.

Foundstone instructors cover all the bases, presenting manual and scripted security-review techniques that go far beyond what automated analysis tools can do. You return to your organization with valuable knowledge, experience, and the ability to put your new skills into practice.


Your instructors are simply the very best. Foundstone instructors are practicing security consultants who bring real world experiences from their hundreds of security engagements to the classroom. They have a broad range of expertise and have collectively taught thousands of students.

Dedicated to pushing boundaries and staying at the fore-front of hacking techniques and technologies, our students have said, "These guys are scary—you should lock them up!"


Nothing to bring. All necessary equipment will be provided including preconfigured workstations, tools and utilities.


You get more than just knowledge of the latest hacker tricks and techniques. You take home the following cool stuff:


If you are a system or network administrator, security personnel, auditor, and/or consultant concerned with network and system security, then you should take this course. Basic Unix and Windows competency is required for the course to be fully beneficial.


Foundstone's management team and selected staff are uniquely qualified to present this material, having performed hundreds of security assessments for Fortune 500 companies. Instructors have managed or directed the security-assessment teams at three of the Big 4 accounting firms, as well as amassed real-world experience ranging from the United States Air Force to Wall Street. Members of the instructor team authored the best-selling Hacking Exposed: Network Security Secrets & Solutions.