|
Monday-Tuesday, July 26-27
|
|
|
Palace Salon I-C 4th Floor
|
Analyzing Software for Security Vulnerabilities
Halvar Flake, Black Hat
|
Palace Salon I-A
4th Floor
|
Aspects of Offensive Root-kit Technology
Greg Hoglund & Jamie Butler
|
|
Network Application Design & Secure Implementation
Drew Miller, Black Hat
|
Palace Salon III-D
4th Floor
|
Web Applications: Attacks & Defense-Advanced Edition
Saumil Udayan Shah
|
|
|
Palace Salon II-A
4th Floor
|
NSA InfoSec Assessment Methodology Course (IAM) -Level 1
Security Horizon
|
Palace Salon II-B
4th Floor
|
NSA InfoSec Evaluation Methodology (IEM) - Level 2
Security Horizon
|
Emperors Salon II
4th Floor
|
OSSTMM Professional Security Analyst (OPSA)
Dyad Security
|
|
|
Palace Salon I-D
4th Floor
|
Discover the Hidden: Steganography Investigator Training
WetStone Technologies
|
|
|
Palace Salon I-B
4th Floor
|
Enterprise Security From Day 1 to Completion:
A Practical Approach to Developing an Information Security Program
Chris Conacher, Black Hat
|
|
Hacking by Numbers: Chief of Staff
SensePost
|
|
|
Emperors Salon I
4th Floor
|
Microsoft Ninjitsu: Securely Deploying MS Technologies
Timothy Mullen
|
|
|
|
|
|
Designing A Secure Web Application Through Enlightenment and Understanding
Next Generation Security Software
|
|
Hacking by Numbers: Bootcamp
SensePost
|
|
Hacking by Numbers: Combat
SensePost
|
|
Infrastructure Attacktecs™ & Defentecs™: Hacking Cisco Networks
Steve Dugan
|
Palace Salon III-C
4th Floor
|
Internal Security Threats: Identification and Prevention
Derek Gabbard, Arbor Networks
|
|
|
|