Please click on any Training title below to see pricing and full description.
Note: Please read all Registration Terms and Conditions carefully.
Training courses include full access to the Business Hall, Sponsor Workshops, Sponsor Sessions, and Arsenal. Briefings are
not included with the purchase of a Training pass; however, you may purchase a Briefings pass to complement your Trainings
once you register. All Briefings and Trainings will be presented in English.
Looking to conduct more effective penetration tests? This challenging, fast-paced course will teach you how to best use available tools and methodologies to accurately emulate modern threats, all while adapting to tightening budgets, limited timeframes and diverse skillsets.
This is not your traditional SCADA security course! This course teaches hands-on penetration testing techniques used to test embedded electronic field devices, network protocols, RF communications, and controlling servers of ICS and Smart Grid systems like PLCs, RTUs, smart meters, Home Area Networks (HAN), smart appliances, SCADA, substation automation, and synchrophasors.
Mobile devices are an unstoppable business that grows every year, expected to reach 2.6 billion units by 2016, and this course teaches how to perform pentesting on them. The course digs into how to break and assess devices and popular Apps across the major platforms by using real and modern attacks and reversing tools. Using proven techniques and tools you will be able to assess the security of any of the millions of mobile Apps that exist today.
By the end of the course, students will be able to:
-Reverse and audit mobile Apps
-Understand mobile attack vectors
-Know common risks to mobile Apps
-Use real and effective tools for mobile security testing
Dark Side Ops: Custom Penetration Testing focuses on using stealthy techniques, advanced attacks, and custom malware to conduct realistic, targeted penetration tests. An intensive, hands-on lab environment with tons of code samples provides participants with a structured and challenging approach to bypass the very latest in offensive countermeasures. Participants will also receive and compile source code to create several custom shells and backdoors as they learn to plan, exploit, pivot, persist, and evade detection in even the most secure networks.
Fuzzing For Vulnerabilities is a two-day hands-on course where students learn the skills necessary to design and implement custom fuzzers. This course will walk students through the basics of setting up a fuzzing environment, writing a fuzzer, and analyzing fuzzer results to determine the scope of code covered during a fuzzing session. Students will leave this course with practical knowledge gained from developing a fuzzer for a real-world application with millions of installations worldwide. If your goal is to learn fuzzing to enhance the security of your own software or to find vulnerabilities in others software, this course will provide you with the knowledge to succeed.
With the Web celebrating its 25th birthday on the 12th of March, web applications have ruled the Internet ever since. There's a web app for most parts of our Internet lives and to a degree, our daily lives. With this large surface area, there's no doubt that they are often the entry point for most breaches. If you look at some of the biggest hacks in the last 18 months, they all come from a flaw in a web application.
This course sets the scene for you start at the beginning with the basics and go all the all the way to learn how to exploit the more advanced techniques. The course focuses on the fundamentals rather than specific tools and introduces you to our hacking methodology refined over thousands of assessments conducted over the last 14 years.
This two-day course has enough theory to ensure you understand what you are trying to achieve, but with a heavy focus on practical exercises. Students should expect lots of hands-on hacking with some of the finest hackers in the industry!
Cyber FEAD is a class that provides students with an in-depth understanding of intelligence processes and through a catalog of tools how to use technology to drive intelligence. Students will learn a variety of topics from building an intelligence program through reverse engineering for intelligence analysis, to communicating and sharing intelligence with peers, partners, and leadership.
Enterprises all over the globe are compromised remotely by hackers each day. Credit card numbers, proprietary information, account usernames and passwords, and a wealth of other valuable data are surreptitiously transferred across the network. Insider attacks leverage cutting-edge covert tunneling techniques to export data from highly secured environments. Attackers' footprints remain throughout the network, in firewall logs, IDS/IPS, web proxies, traffic captures, and more.
From the authors of "Network Forensics: Tracking Hackers Through Cyberspace" (Prentice Hall, 2012) comes Network Forensics: Black Hat Asia Release.
An introduction to digital signal processing, software radio, and the powerful tools that enable the growing array of SDR projects within the hacker community, this course takes a unique "software radio for hackers" approach, building on the participants' knowledge of computer programming and introducing them to the forefront of digital radio technology. Participants will learn how to transmit, receive, and analyze radio signals and will be prepared to use this knowledge in the research of wireless communication security. Each student will receive a HackRF One software defined radio transceiver, a $300 value.