Learn leading network security practices from experts who develop these techniques and put them to practical use.
Overview
Security engineering teams often focus on the security of networked workstations, servers and applications, neglecting the network itself. Many networks also receive only rudimentary security implementations that are often deployed inconsistently. These scenarios not only fail to completely protect the network from the threats of today, they fail to fully utilize the network to detect and mitigate attacks against the computing infrastructure of an organization.
During this course students will learn leading network security practices from experts who develop these techniques and put them to practical use. The techniques covered in this course are not limited to those typically thought of as “security features”; this course will detail how to leverage innate network functionality—such as routing protocols and NetFlow—to provide a full range of attack identification and mitigation capabilities. This course is organized around a proven six phase approach to incident response, which moves from preparation through post mortem, and includes extensive demonstrations and hands-on lab work.
Tim Sammut, CCIE No. 6642, is a Sr. Security Engineer in the Security Intelligence Engineering organization at Cisco where he helps customers leverage their Cisco infrastructure to overcome emerging security challenges. In this role he creates mitigation techniques to be used in conjunction with Cisco security advisories and white papers that detail specific security threats, techniques or technologies. Tim is a published author with more than 12 years of experience in some of the largest and most complex internetworks.
Randy Ivener, CCIE No. 10722, is a Sr. Security Engineer with the Cisco Applied Intelligence team. He is a CISSP and ASQ CSQE. Randy has spent many years as a network security consultant helping companies understand and secure their networks. Before becoming immersed in information security, he spent time in software development and as a training instructor. Randy graduated from the U.S. Naval Academy and holds an MBA.
Joseph Karpenko currently works as a Sr. Security Engineer in the Security Intelligence Engineering organization at Cisco. Joseph is a 10-year veteran of technology with expertise in networking, security, data center, and the systems administration fields. Currently Joseph is responsible for developing security solutions that deter, detect, and prevent existing, current, and emerging threats and attacks. Joseph has also been a speaker at multiple conferences presenting on security topics. During his career, Joseph has worked with customers on the design and implementation of large-scale enterprise and data center network and security architectures. Prior to joining Cisco, Joseph worked as a system administrator and senior escalation engineer handling and troubleshooting complex security and network incidents.
Super Early:
Ends Mar 15 |
Early:
Ends May 1 |
Regular: |
Late: |
Onsite: |
$1900 |
$2000 |
$2200 |
$2400 |
$2700 |
Black Hat USA 2009
July 25-30
Caesars Palace
Las Vegas, NV
Training July 25-28
Briefings July 29-30
Black Hat USA Briefings Main page is online now.
Find out about our 2009 venue, Caesars Palace.
Black Hat Webcasts
On the third Thursday of every month, Black Hat does a free infosec webcast. Meet security thought leaders and get your questions answered.
Can't make it to our live webcast events? Subscribe to the Black Hat Webcast RSS feed and take the webcasts with you in podcast form.
Upcoming Topics
Black Hat Social
LinkedIn
LinkedIn members can join our Black Hat Group and post news articles of interest to the community, make connections and discuss security topics.
Facebook
We have a Facebook fan page now. Please check us out there - share your ideas, your photos, and your videos with us.
Flickr
Check out our Black Hat photostream. Comment. Contribute. Got great pix? Share with the community.
Twitter
Find out what's going on with Black Hat in real time by following us on Twitter. Meet other Black Hat speakers and attendees, share what matters to you.
Delicious
When something in the news catches our eye at Black Hat HQ, we post the link on Delicious.