rss feed link header graphic

Black Hat USA Training 2009

Caesars Palace Las Vegas • July 25-28


A Certificate of Completion is offered for each class.

Course Offerings by Category

Network

Are you in the trenches, working with the nuts and bolts of an infrastructure? These courses are meant to give you an understanding of what’s happing across the wire from layers 2 – 4 of the OSI model.

Building a Better Mouse Trap:
The Art of Developing Effective Intrusion Detection/Prevention Signatures

by Rohit Dhamankar & Rob King

Learn how to implement effective network intrusion prevention.

header graphic

Detecting & Mitigating Attacks Using Your Network Infrastructure
by Randy Ivner, Cisco Systems and Tim Sammut , Cisco Systems

Learn leading network security practices from experts who develop these techniques and put them to practical use.

Infrastructure Attacktecs™ & Defentecs™: Hacking Cisco Networks by Steve Dugan

Extremely popular and intense hands-on course.

header graphicMicrosoft Ninjitsu: Black Belt Edition by Timothy Mullen, Jim Harrison & Dr. Thomas Shinder

This one-of-a-kind training course will arm attendees with the skills needed to design, deploy, maintain and secure even the most sophisticated Microsoft infrastructures. This "special edition" course will also include the development and design of ISA Server DMZ configurations and deployments to further secure your Microsoft installations

header graphic

Mastering the Metasploit Framework by HD Moore, Metasploit

This course dives into the newest features of the Metasploit Framework and demonstrates how to use these features in every aspect of a penetration test.

header graphic

Tactical Exploitation by HD Moore

Using a combination of new tools and lesser-known techniques, attendees will learn how hackers compromise systems without depending on standard exploits.

TCP/IP Weapons School 2.0 by Richard Bejtlich, TaoSecurity header graphic

Learn how networks can be abused and subverted, while analyzing the attacks, methods, and traffic that make it happen.

Ultimate Hacking: Wireless by Foundstone

In depth coverage of current security topics. Not for Beginners.

header graphicUnderstanding and Deploying DNSSEC by Paul Wouters and Patrick Nauber

This one-of-a-kind training course will arm attendees with the skills needed to design, deploy, maintain and secure even the most sophisticated Microsoft infrastructures. This "special edition" course will also include the development and design of ISA Server DMZ configurations and deployments to further secure your Microsoft installations


© 1997-2009 Black Hat