Black Hat USA Training 2010

Caesars Palace Las Vegas • July 25-28


A Certificate of Completion is offered for each class.

Course Offerings by Category

Application Security

From design and development to maintenance and testing this series of classes are centered-around secure development throughout an application’s life-cycle.

Advanced Web Application Security Testing by Aspect Security

Students gain hands-on testing experience with freely available web application security test tools to find and diagnose flaws and learn to identify them in their own projects.

header graphic

Analyzing and Securing Enterprise Application Code by Blueinfy (Shreeraj Shah & Vimal Patel)

The emphasis of the class would be to develop a complete understanding of source code analysis, audit methodologies, techniques and tools. Knowledge gained would help in analyzing and securing enterprise applications at all different stages - architecture, design and/or development.

Application Security: For Hackers and Developers by Crucial Security

This course will have 4 components: reverse engineering, source code auditing, fuzzing, and exploitation. Each section contains a liberal amount of labs and hands-on exercises.

Building and Testing Secure Web Applications by Aspect Security

Hands-on exercises where the students get to perform security analysis and testing on a live web application.

Building Secure Web Services by Aspect Security

This class includes hands-on exercises where the students get to perform security analysis and testing on a live web application.

Effective Fuzzing: Using the Peach Fuzzing Platform
by Michael Eddington, Leviathan and Blake Frantz, Leviathan

The first comprehensive hands-on fuzzing course centered on the industry standard Peach Fuzzing Platform. Learn how to fuzz just about anything with Peach. No coding required, but recommended.

The Exploit Laboratory by Saumil Udayan Shah

Learn how to expose the inner mechanisms of exploits and how they work. The class is highly hands-on and very lab intensive.

header graphic

Finding Security Bugs in Closed-source Software: Beginner by Halvar Flake
July 25-26 only

Intense course encompassing binary analysis, reverse engineering and bug finding.

header graphic

Finding Security Bugs in Closed-source Software: Advanced by Halvar Flake
July 27-28 only

Intense course encompassing binary analysis, reverse engineering and bug finding.

header graphic

Gray Hat Hacking: Exploit and Metasploit Module Development by Allen Harper

Working through lab examples and real world vulnerabilities to take you to the next level

Hacking by Numbers: Web 2.0 by SensePost

Web 2.0 is a whole new world and Hacking By Numbers - Web 2.0 Edition is a course designed to prepare you for it.

Leading, Planning, and Executing an Application Security Initiative by Aspect Security

For executives and managers - get the education and practical guidance you need to ensure that your software projects properly address security in this collaborative workshop 2 day session.

ModSecurity: Deployment and Management by Ryan Barnett, Breach Security

Designed for those people who want to quickly learn how to build, deploy, and use ModSecurity in the most effective manner possible.

header graphic Security for Web Based Database Applications by Aspect Security

This class includes hands-on exercises where the students get to perform security analysis and testing on a live web application supported by a back end database.

Web Application (In)security by NGS Software

If you are concerned with the security of web applications and the insecurity they introduce to your back end information systems this is the workshop for you.

header graphic

Secure Coding for Java EE by Aspect Security

Hands-on exercises where the students get to perform security analysis and testing on a live Java EE web application.