Black Hat USA 2010 //Training
Caesars Palace Las Vegas, NV • July 24-27
//all training |
Complete List of Black Hat USA 2010 Training Courses:
Black Hat USA 2010 brings together the best minds in security to define tomorrow’s information security landscape. Featuring many new tracks and new training sessions, Black Hat USA is the biggest and best conference we've ever presented. Training Category Matrix - get printable pdf » |
TRAINING: SCHEDULE »
LEGEND:
Weekday Course | Weekend Course |
4-Day Course | Course Cancelled! |
( | NOTICE: Registrants are notified when courses are chosen for cancellation; this training list reflects all course availabilities and is updated regularly. | ) |
Advanced Malware Analysis by MANDIANT
//MANDIANT (Nick Harbour & Jay Smith) - Four Day Course
Students will learn to combat sophisticated malware head-on by studying its anti-analysis techniques.
Advanced Malware Analysis Using Responder Professional //NEW 2010
//HBGary (Greg Hoglund & Shawn Bracken)
Students will learn to combat sophisticated malware head-on by studying its anti-analysis techniques.
Advanced Malware Deobfuscation
//Jason Geffner & Scott Lambert
Learn how to manually unpack the most advanced obfuscation protections.
Advanced Memory Forensics in Incident Response
//Jamie Butler & Peter Silberman
Specifically designed for information security professionals and analysts who respond to computer security incidents. It is designed as an operational course, using case studies and hands-on lab exercises to ensure attendees are gaining experience in each topic area.
Advanced Vulnerability Scanning Techniques Using Nessus //NEW 2010
//Paul Asadoorian, Tenable Security
This course teaches advanced scanning techniques by using a real-world scenario to demonstrate how these techniques help to solve problems in an example work environment.
Advanced Web Application Pen-Testing: Web 2.0 Edition //NEW 2010
//Aspect Security
Students gain hands-on testing experience with freely available web application security test tools to find and diagnose flaws and learn to identify them in their own projects.
Advanced Windows Exploitation Techniques
//Offensive Security (Matteo Memelli & Jim O’Gorman) - Four Day Course
An in depth, hardcore drilldown into advanced Windows Vulnerability Exploitation techniques.
Application Security: For Hackers and Developers
//Jared DeMott, Harris
This course will have 4 components: reverse engineering, source code auditing, fuzzing, and exploitation. Each section contains a liberal amount of labs and hands-on exercises.
AppSec Leadership Essentials //NEW 2010
//Aspect Security
A practical, step-by-step approach to securing an entire organization.
Assaulting IPS
//Craig Williams, Mike Caudill & Kevin Timm, Cisco Systems
Learn to be become a skilled and knowledgeable IPS tester.
Assessing and Exploiting Web Applications with Samurai-WTF
//NEW 2010
//InGuardians
Using open source tools to perform web application assessments, this course will take attendees through the process of application assessment using the open source tools included in the Samurai Web Testing Framework Live CD (Samurai-WTF).
Basic Malware Analysis Using Responder Professional //NEW 2010
//HBGary (Martin Pillion & Rich Cummings)
Students will learn to combat sophisticated malware head-on by studying its anti-analysis techniques.
Building a Better Mouse Trap: The Art of Developing Effective Intrusion Detection/Prevention Signatures
//Rohit Dhamankar & Rob King
Learn how to implement effective network intrusion prevention.
CISSP® Boot Camp
//Shon Harris - Four Day Course
This Logical Security course trains students in all areas of the security Common Body of Knowledge (CBK). Using this course, students prepare for the exam, while at the same time obtaining essential security knowledge that can be immediately used to improve organizational security.
CISSP® Review Seminar
//Shon Harris - Tuesday, July 27 Only
This Logical Security course trains students in all areas of the security Common Body of Knowledge (CBK). Using this course, students prepare for the exam, while at the same time obtaining essential security knowledge that can be immediately used to improve organizational security.
Designing Secure Protocols and Intercepting Secure Communication
// Moxie Marlinspike - Weekend Only
This is a new and special training that covers both designing and attacking secure protocols. Attendees will learn the fundamentals of how to design a secure protocol, and be armed with the knowledge of how to evaluate the security of and discover weaknesses in existing protocols.
Detecting & Mitigating Attacks Using Your Network Infrastructure
// Cisco Systems (Randy Ivener, Joseph Karpenko & Tim Sammut)
Learn leading network security practices from experts who develop these techniques and put them to practical use.
Effective Fuzzing: Using the Peach Fuzzing Platform
//Leviathan (Michael Eddington & Adam Cecchetti)
The first comprehensive hands-on fuzzing course centered on the industry standard Peach Fuzzing Platform. Learn how to fuzz just about anything with Peach. No coding required, but recommended.
Enterprise Security From Day 1 to Completion
//Chris Conacher - July 24 - 27 only
A practical approach to developing an information security program.
The Exploit Laboratory
//Saumil Udayan Shah & S.K. Chong
Learn how to expose the inner mechanisms of exploits and how they work. The class is highly hands-on and very lab intensive.
The Exploit Laboratory: Black Belt Edition //NEW 2010
//Saumil Udayan Shah & S.K. Chong
Black Belt is a new and advanced class continuing from where The Exploit Laboratory left off. This class is for those curious to dig deeper into the art and craft of software exploitation.
Finding Security Bugs in Closed-source Software: Advanced
//Halvar Flake -
July 24 - 27 only
Intense advanced course encompassing binary analysis, reverse engineering and bug finding.
Finding Security Bugs in Closed-source Software: Beginner
//Halvar Flake - July 24 - 25 only
Intense beginner course encompassing binary analysis, reverse engineering and bug finding.
Gray Hat Hacking: Moving to the Next Level //UPDATED 2010
//Allen Harper
Working through lab examples and real world vulnerabilities to take you to the next level
Hacking by Numbers: Bootcamp
//SensePost
Novice level. A highly practical course that teaches method-based hacker thinking, skills and techniques.
Hacking by Numbers: Cadet
//SensePost
Novice level. A highly practical course that teaches method-based hacker thinking, skills and techniques.
Hacking by Numbers: Combat Training
//SensePost
Advanced level. This course is all hack, no talk.
Hacking by Numbers: Web 2.0
//SensePost
Web 2.0 is a whole new world and Hacking By Numbers - Web 2.0 Edition is a course designed to prepare you for it.
Hands-On Hardware Hacking and Reverse Engineering Techniques: Black Hat Edition
//Joe Grand - Weekend Only
This course is the first of its kind and focuses entirely on hardware hacking.
IDA Pro Class: Reverse Engineering with IDA Pro
//Chris Eagle
Essential background material for effective reverse engineering.
Incident Response: Black Hat Edition by MANDIANT
//
MANDIANT (Kris Harms & Dan McWhorter)
Specifically designed for information security professionals and analysts who respond to computer security incidents.
Infrastructure Attacktecs™ & Defentecs™: Hacking Cisco Networks
//Steve Dugan
Extremely popular and intense hands-on course.
Introduction to Malware Analysis
//Jason Geffner & Scott Lambert
No Source? No Symbols? No Problem.
Mac Hacking Class //NEW 2010
//Vincenzo Iozzo & Dino Dai Zovi
The aim of this class is to provide the student with all the skills needed in order to fully perform research on this OS. Specifically how to write payloads, what are the tools needed to perform research and all the hidden oddities of OS X which other UNIX-based systems don’t have.
Malware Analysis: Black Hat Edition by MANDIANT
//MANDIANT (Michael Sikorski & Steve Davis)
This introductory course is for those interested in entering the field of malicious software analysis.
Pentesting High Security Environments //NEW 2010
//Joseph McCray - July 26-27 Only
Focus on penetration testing techniques that can be used when testing highly secured environments.
Pentesting with BackTrack //NEW 2010
//Offensive Security (Mati Aharoni & Chris Hadnagy) - Four Day Course
This is an intensive, hardcore, hands on Security class by the creators of Backtrack especially designed for delivery in BlackHat Trainings.
Pentesting with Perl //NEW 2010
//Joshua Abraham - Tuesday, July 27 Only
Utilize Perl to streamline the tedious aspects of pentesting.
Physical Penetration Testing: From Beginner to Expert
//Deviant Ollam - July 26-27 Only
Those who attend this session will leave with a full awareness of how to best protect buildings and grounds from unauthorized access.
Real World Security: Attack, Defend, Repel //NEW 2010
//Peak Security - July 26-27 Only
An intensive 2 day course/exercise for the security professional that wants to up the ante on their current skill sets in offensive and defensive security. Learn new tactics and receive guidance from expert instructors while you test yourself in a team vs team environment. Hands on and technical.
RFID, Access Control & Biometric Systems
//Zac Franken & Adam Laurie
This workshop is geared towards security professionals whose duties and responsibilities include guiding security decisions for whole departments or even entire companies.
The RSA Cryptosystem: Attacks and Implementation Dangers //NEW 2010
//Andrew Lindell - Sunday, July 25 Only
This workshop is geared towards security professionals whose duties and responsibilities include guiding security decisions for whole departments or even entire companies.
SAP Security In-Depth //NEW 2010
// Mariano Nuñez Di Croce, Onapsis - July 26-27 Only
Have you ever wondered whether your business-critical SAP implementation was secure? Do you know how to check it? Have you imagined which could be the impact of an attack to your core business platform? Do you know how to prevent it? This training is the answer to these questions.
Secure the Human
//Lance Spitzner, Honeytech
Everything you need to plan, deploy and maintain a successful awareness and training program.
Senior System Manager (CNSS-4012 (Certified)), ISSM/IAM
//Information Assurance Associates (IA2) - Four Day Course
Very focused, highly concentrated, non-technical professional training necessary to achieve the fundamental knowledge needed to define, design, integrate and manage information system security policies, processes, practices, and procedures within federal interest information systems and networks.
Static Code Analysis for Enterprise Applications, Web Services and Web 2.0 //NEW 2010
//Shreeraj Shah, Blueinfy
We will be covering analysis techniques, with tools, for assessment and review of enterprise application source code. Enterprise 2.0 and mashups, along with other different Web 2.0 concepts, reinforced by hands-on experience, will help in understanding next generation application requirements.
StegAnalysis Investigations: Investigator Training //NEW 2010
//WetStone Technologies - July 24-25 Only
Students will participate in hands on experiments with stego’d images, multimedia files, advanced network protocols and Steganographic file systems. Detailed analytical and jamming methods will be utilized to both discover and disrupt Steganographic operations.
Symmetric Cryptography: Constructions and Cryptanalysis //NEW 2010
//Andrew Lindell - July 26-27 Only
Hands-on, in-depth understanding of how symmetric cryptographic primitives are constructed and broken, with a focus on block ciphers and cryptographic hash functions.
Tactical Exploitation
//HD Moore
Using a combination of new tools and lesser-known techniques, attendees will learn how hackers compromise systems without depending on standard exploits.
TCP/IP Weapons School 2.0
//Richard Bejtlich, TaoSecurity
Learn how networks can be abused and subverted, while analyzing the attacks, methods, and traffic that make it happen.
Ultimate Hacking: Black Hat Edition //UPDATED 2010
//Foundstone
This course delivers hands on application of Foundstone's hacker methodology. This course has long been considered essential for penetration testers.
Ultimate Hacking: Wireless
//Foundstone
This course delivers hands on application of Foundstone's wireless hacking methodology. This course takes you from configuring interfaces to the latest attacks.
Understanding and Deploying DNSSEC
//Paul Wouters and Patrick Naubert
This one-of-a-kind training course will arm attendees with the skills needed to design, deploy, maintain and secure even the most sophisticated Microsoft infrastructures. This "special edition" course will also include the development and design of ISA Server DMZ configurations and deployments to further secure your Microsoft installations
Virtualization for Incident Responders //NEW 2010
//Eric Fiterman - Methodvue
Principles and techniques for recovering evidence from virtualized systems and cloud environments - this course is intended for information security personnel who are responsible for handling incidents involving virtual infrastructure, cloud service providers, or desktop virtualization platforms.
Virtualization (In)Security
//Joanna Rutkowska & Rafal Wojtczuk - July 26-27 only
An unbiased view on the security of recent Xen systems (Xen 3.3 and 3.2), show exemplary attacks and a study of how various technology (e.g. Intel VT-d and TXT) and clever design of the VMM can help to improve security.
WAF Virtual Patching Workshop //NEW 2010
//
Ryan C. Barnett & Brian Rectanus - Tuesday, July 27 Only
This workshop is intended to provide an overview of the recommended practices for utilizing a web application firewall for virtual patching.
WarfaRE - Offensive Reverse Engineering //NEW 2010
// Pedram Amini & Ero Carrera
Understanding the inner workings of advanced malware goes beyond simply reverse engineering it. Thinking like the attacker helps in anticipating future techniques.
The Web Application Hacker's Handbook - Live Edition //NEW 2010
//Dafydd Stuttard & Marcus Pinto
This course follows the chapters of The Web Application Hacker’s Handbook, with strong focus on practical attacks and methods and concludes with a Capture the Flag contest.
Web Application (in)Security
//John Heasman & Daniel Martin
Finally, the long awaited successor to NGS’s hugely popular Web Application (In)Security Course is coming to BlackHat Vegas this year!
This is a cutting-edge, hands-on course aimed at hackers who want to exploit web applications, and developers who want to know how to defend them.
Web Security //NEW 2010
//Hristo Bojinov, Dan Boneh, Elie Bursztein & John Mitchell - July 26-27 Only
Get a 360-degree overview of web application security.
Windows Physical Memory Acquisition and Analysis //NEW 2010
//Matthieu Suiche
Want to learn all about memory dumps, including how they work and deep analysis using Windbg.