A Certificate of Completion offered for each class.
See the
Training Schedule.
Black Hat USA 2008 brings together the best minds in security to define tomorrow’s information security landscape. Featuring many new tracks and new training sessions, Black Hat USA is the biggest and best conference we've ever presented.
Advanced level: Push Asp.Net to the limit. See how Asp.Net applications and environments can be exploited by skilled attackers, and how those same techniques can be used to protect the targeted assets.
Advanced Course – Hands on 2-Day intensive – learn how to test web applications for security flaws like the experts.
A major case study and various hands-on components are used to guide executives and information security managers in understanding how they can improve their organization's overall security posture.
Delves deeply into Oracle server security and complements the Advanced Database Security Assessment Course
Hands-on exercises where the students get to perform security analysis and testing on a live web application.
The first comprehensive hands-on fuzzing course centered on the industry standard Peach Fuzzing Platform. Lean how to fuzz just about anything with Peach. No coding required, but recommended.
Designed for those people who want to quickly learn how to build, deploy, and use ModSecurity in the most effective manner possible.
How to secure an SAP system? How to perform a security assessment of an SAP system? These are the two questions that this course tries to answer.
If you are concerned with the security of web applications and the insecurity they introduce to your back end information systems this is the workshop for you.
Discover flaws in database security and effectively develop strategies to keep attackers out.
This Course is Closed. No seats are available.
Learn to attack and secure Windows.
Novice level. A highly practical course that teaches method-based hacker thinking, skills and techniques.
Novice level. A highly practical course that teaches method-based hacker thinking, skills and techniques.
Advanced level. This course is all hack, no talk.
Web 2.0 is a whole new world and Hacking By Numbers - Web 2.0 Edition is a course designed to prepare you for it.
This is an intensive, hardcore, hands on Security class by the creators of Backtrack especially designed for delivery in BlackHat Trainings. The course is an interesting amalgamation between our entrylevel course (Offensive Security 101) and expert level course (BackTrack to the Max).
Roll up your sleeves and dive in to this hands-on tutorial on how to discover vulnerabilities in your J2EE code using static source code analysis.
Learn how networks can be abused and subverted, while analyzing the attacks, methods, and traffic that make it happen.
The definitive training regimen for assessing and securing your networks.
In depth coverage of current security topics. Not for Beginners.
Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
The ECSA course equips one with the knowledge and know-hows to become an EC-Council Licensed Penetration Tester.
You will need this course before you can take the IEM course. Earn NSA Certification.
The followup course to the IAM. Earn NSA certification.
In this course, students will gain an in-depth understanding of how cryptographic primitives are constructed and broken.
Learn how to expose the inner mechanisms of exploits and how they work. The class is highly hands-on and very lab intensive.
Working through lab examples and real world vulnerabilities to take you to the next level
A comprehensive course for investigating the suspected use of digital steganography
Specifically designed for information security professionals and analysts who respond to computer security incidents.
The most effective approach to get into the mind of cyber criminals is to utilize their tools and technologies in a hands-on environment and become familiar with the fundamental hacking process. This four day course is structured with interactive lab environments to allow students to work together and experience real investigative scenarios. Learn how to become the lead investigator in your office and learn to stay one step ahead of the criminals.
"Live" enterprise investigation training.
This class will focus on the use of freeware and open source tools to perform advanced memory analysis.
This course is the first of its kind and focuses entirely on hardware hacking.
This workshop is geared towards security professionals whose duties and responsibilities include guiding security decisions for whole departments or even entire companies.
This course is designed to provide process control professionals with a fundamental understanding of the steps needed to effectively defend their critical infrastructure assets.
Learn how to protect embedded and smart card technology against side channel analysis
No Source? No Symbols? No Problem.
This introductory course is for those interested in entering the field of malicious software analysis.
An in-depth understanding of how advanced stealth malware works, how it interacts with the operating system, underlying harware and network.
A practical, step-by-step approach to securing an entire organization.
For executives and managers - get the education and practical guidance you need to ensure that your software projects properly address security in this collaborative workshop 2 day session.
Learn how to implement effective network intrusion prevention.
A new hands-on course offering from the creator of Hacking Cisco Networks.
This Course is Closed. No seats are available.
Extremely popular and intense hands-on course.
Learn how to attack VoIP
Intense course encompassing binary analysis, reverse engineering and bug finding.
Essential background material for effective reverse engineering.
This class is meant to impart cutting-edge understanding of malicious code analysis upon attendees, ultimately taking them to an advanced level of reverse engineering skills applicable to other security domains.
This two day class will cover useful techniques and methods for incident response in the field when machines are suspected of intrusion with stealthy malware.
This one-of-a-kind training course will arm attendees with the skills needed to design, deploy, maintain and secure even the most sophisticated Microsoft infrastructures. This "special edition" course will also include the development and design of ISA Server DMZ configurations and deployments to further secure your Microsoft installations
Wireless Security Class... Hot!
Knowledge is power and you do not want the hackers to know more about your wireless networks than you do…