Black Hat Digital Self Defense USA 2004
Trainiing

Note: if the class is overfilled, then you will be contacted should this occur.

training

Black Hat USA Training 2004
Caesars Palace Las Vegas • July 24-25

Course Length: 2 days

Cost: US $2000 before July 1, 2004 or US $2200 after July 1, 2004
All course materials, lunch and two coffee breaks will be provided. NOTE: this is a two day course. A Foundstone Certificate of Completion will be offered.

Two Day Course
July 24-25
Ultimate Hacking: Black Hat Edition
Foundstone

What to bring:
Nothing to bring. All necessary equipment will be provided including preconfigured workstations, tools and utilities.

This course has sold out every time it has been offered. Don’t wait. Sign up now!

Foundstone created the ultimate in “Hands On” security training. Designed to arm security pros with the skills to keep hackers at bay, Ultimate Hacking: Black Hat Edition is an action packed two day intensive covering the latest methodologies, tools, and techniques necessary to assess and secure your connected environment. This special “Black Hat” edition is a derivative of the longer Ultimate Hacking class that is taught to the general public, the military, and many government agencies.  Foundstone has taken the best content from Ultimate Hacking and created a shorter, accelerated version for Black Hat.

Ultimate Hacking: Black Hat Edition begins from a “zero-knowledge” perspective. Start by profiling your target, then learn how to identify and exploit well-known and obscure vulnerabilities in the most popular operating systems including Windows and multiple Unix flavors.

But don’t just listen to us – put your skills to use and learn by doing. Foundstone challenges you with countless hands on exercises and demonstrate your expertise as you race other students to achieve the ultimate goal…getting root.

Topics include:

  • Assessing and Penetrating Windows & Unix networks and hosts
  • Enumerating Information from Windows hosts 
  • Linking Windows and Unix Vulnerabilities for maximum impact
  • Securing Windows & Unix hosts 

Why Do We Teach This Class?
Security vulnerabilities are an unfortunate, but unavoidable, part of today's computing systems. If exploited by internal or external users, these weaknesses can be catastrophic to your organization. Foundstone teaches step-by-step procedures for executing Internet, intranet, and host-level security reviews. This course is the definitive training for learning how to perform "tiger team" and attack and penetration assessments.

Foundstone instructors cover all the bases, presenting manual and scripted security-review techniques that go far beyond what automated analysis tools can do. You return to your organization with valuable knowledge, experience, and the ability to put your new skills into practice.

Who Teaches This Class?
Your instructors are simply the very best. Foundstone instructors are practicing security consultants who bring real world experiences from their hundreds of security engagements to the classroom. They have a broad range of expertise and have collectively taught thousands of students. 

Dedicated to pushing boundaries and staying at the fore-front of hacking techniques and technologies, our students have said, “These guys are scary…you should lock them up!”

What Do I Get?
You get more than just knowledge of the latest hacker tricks and techniques. You take home the following cool stuff:

  • A copy of “HackNotes: Network Security Portable Reference
  • Foundstone t-shirt
  • Certificate of Completion
  • CD carrying case
  • FS Live™ – the newly released, full featured Unix Attack and Penetration system on a bootable CD from Foundstone. Based on the Knoppix Live Linux distribution, Foundstone has collected and configured the most requested security tools to run off a bootable CD. Now you can use all of these vital tools with no hardware and software configuration issues!

Plus you don’t need to bring anything with you to the class. You will have your own dual-boot Windows/Linux laptop to use throughout the class as your attack platform as you put your new skills to work.

Who Should Take the Course?
If you are a system or network administrator, security personnel, auditor, and/or consultant concerned with network and system security, then you should take this course. Basic Unix and Windows competency is required for the course to be fully beneficial.

ISC2 CISSP/SCCP CPE Credits
Students are eligible to receive 16 Continuing Professional Education (CPE) credits upon completion of class. Foundstone will automatically forward your information to ISC2. If you would like to take part in this service, please bring your ID number to class.

Course Length: 2 days

Cost: US $2000 before July 1, 2004 or US $2200 after July 1, 2004
All course materials, lunch and two coffee breaks will be provided. NOTE: this is a two day course. A Foundstone Certificate of Completion will be offered.

REGISTER NOW

Trainer:

Foundstone's management team and selected staff are uniquely qualified to present this material, having performed hundreds of security assessments for Fortune 500 companies. Instructors have managed or directed the security-assessment teams at three of the Big 5 accounting firms, as well as amassed real-world experience ranging from the United States Air Force to Wall Street. Members of the instructor team authored the best-selling Hacking Exposed: Network Security Secrets & Solutions and write a weekly column for InfoWorld magazine. They are also frequent speakers at industry conferences such as NetWorld+Interop, Usenix, and the Black Hat Briefings.

Black Hat Logo
(c) 1996-2007 Black Hat