|
|
|
Class Name
|
Weekend
|
Weekday
|
|
|
The nuts and bolts of the Metasploit Framework.
Metasploit 3.0 Internals
Matt Miller, aka skape
|
|
|
|
Learn how to attack VoIP
Tactical VoIP: Applied VoIPhreaking
the Grugq
|
|
|
|
The definitive training regimen for assessing and securing your networks.
Ultimate Hacking: Black Hat Edition
Foundstone
|
|
|
|
|
|
|
|
If you are concerned with the security of web applications and the insecurity they introduce to your back end information systems this is the workshop for you.
Web Application (In)security
NGS Software
|
|
|
SensePost classes in the recommended order that they should be taken
|
|
Beginner level. An introduction to the art and science of computer hacking.
Hacking by Numbers: Cadet
SensePost
|
|
|
|
Novice level. A highly practical course that teaches method-based hacker thinking, skills and techniques.
Hacking by Numbers: Bootcamp
SensePost
|
|
|
|
Advanced level. This course is all hack, no talk.
Hacking by Numbers: Combat Training
SensePost
|
|
|
|
Advanced level. The world’s first objective technical grading system for hackers and penetration testers.
Hacking by Numbers: Combat Grading
SensePost
|
|
|
|
|
|
Advanced level: Push Asp.Net to the limit. See how Asp.Net applications and environments can be exploited by skilled attackers, and how those same techniques can be used to protect the targeted assets.
Advanced Asp.Net Exploits and Countermeasures
IOActive
|
|
|
|
No Source? No Symbols? No Problem.
Advanced Malware Deobfuscation
Jason Geffner & Scott Lambert
|
|
|
|
Intense course encompassing binary analysis, reverse engineering and bug finding.
Analyzing Software for Security Vulnerabilities
Halvar Flake, Black Hat
|
|
|
|
New course offering from the creator of BugScan
Automating Exploit Detection: Cutting-edge Tools and Techniques
Matt Hargett & Luis Miras
|
|
|
|
This class raises developer awareness of application security issues and provides examples of ‘what to do’ and ‘what not to do.'
Building and Testing Secure Web Applications
Aspect Security
|
|
|
|
Essential background material for effective reverse engineering.
Reverse Engineering with IDA Pro
Chris Eagle
|
|
|
|
Learn to reverse engineer real-world virus samples.
Reverse Engineering on Windows: Application in Malicious Code Analysis
Pedram Amini & Ero Carrera
|
|
|
|
|
|
This introductory course is for those interested in entering the field of malicious software analysis.
Malware Analysis Black Hat Edition
Mandiant
|
|
|
|
This course has received rave reviews.
Digital Investigations: Practical Digital Forensic Analysis
the Grugq
|
|
|
|
A comprehensive course for investigating the suspected use of digital steganography
Discover the Hidden: Steganography Investigator Training
WetStone Technologies
|
|
|
|
“Live” enterprise investigation training.
Live Digital Investigation Investigating the Enterprise
WetStone Technologies
|
|
|
|
|
|
This course is the first of its kind and focuses entirely on hardware hacking.
Hands-On Hardware Hacking and Reverse Engineering
Techniques: Black Hat Edition
Joe Grand
|
|
|
|
|
Learn how to protect embedded and smart card technology against side channel analysis
Side Channel Analysis and Countermeasures
Riscure
|
|
|
|
|
|
This is a four day course
ECSA Qualified Security Analyst and Licensed Penetration Tester* *Available only to those participating in the ECSA Course at Black Hat
Security University
|
|
|
This is a four day course. You'll learn everything you need to know to evaluate, create, and implement safe edge authentication, spyware, virus & trojan incident management program to protect your edge.
Qualified Edge Protector: From IPS, Firewalls and Spyware, to Trojans and Viruses
Security University
|
|
|
You will need this course before you can take the IEM course. Earn NSA Certification.
NSA InfoSec Assessment Methodology Course (IAM) - Level 1
Security Horizon
|
|
|
|
The followup course to the IAM. Earn NSA certification.
NSA InfoSec Evaluation Methodology (IEM) - Level 2
Security Horizon
|
|
|
|
|
|
A practical, step-by-step approach to securing an entire organization.
Enterprise Security From Day 1 to Completion:
A Practical Approach to Developing an Information Security Program
Chris Conacher, Black Hat
|
|
|
|
Hacking by Numbers: Chief of Staff
SensePost
|
|
|
|
Incident Response: Black Hat Edition
Mandiant
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
This one-of-a-kind training course will arm attendees with the skills needed to design, deploy, maintain and secure even the most sophisticated Microsoft infrastructures. This "special edition" course will also include the development and design of ISA Server DMZ configurations and deployments to further secure your Microsoft installations
Microsoft Ninjitsu: Black Belt Edition
Timothy Mullen, Jim Harrison & Dr. Thomas Shinder
|
|
|
|
|
|
Discover flaws in database security and effectively develop strategies to keep attackers out
Advanced Database Security Assessment
NGS Software
|
|
|
|
Delves deeply into Oracle server security and complements the Advanced Database Security Assessment Course
Breakable: Secure Your Oracle Servers By Breaking Into Them
David Litchfield & Mark Litchfield
|
|
|
|
Learn how to expose the inner mechanisms of exploits and how they work. The class is highly hands-on and very lab intensive.
The Exploit Laboratory: Analyzing Vulnerabilities and Writing Exploits
Saumil Udayan Shah
|
|
|
|
A new hands-on course offering from the creator of Hacking Cisco Networks
Infrastructure Attacktecs & Defentecs: Cisco Voice Over IP
Steve Dugan & Rodney Thayer
|
|
|
|
Extremely popular and intense hands-on course.
Infrastructure Attacktecs & Defentecs: Hacking Cisco Networks
Steve Dugan
|
|
|
|
Wireless Security Class... Hot!
Invisible Network, Invisible Risk
Adam Laurie
|
|
|
|
Learn how networks can be abused and subverted, while analyzing the attacks, methods, and traffic that make it happen.
TCP/IP Weapons School: Black Hat Edition
Richard Bejtlich, TaoSecurity
|
|
|
|
Knowledge is power and you do not want the hackers to know more about your wireless networks than you do
Ultimate Hacking: Wireless Edition
Foundstone
|
|
|
|