Black Hat Europe 2010 //training
Barcelona, Spain • Apr 12 - 13
//all training |
Complete List of Black Hat Europe 2010 Training Courses
Black Hat Europe 2010 brings together the best minds in security to define tomorrow’s information security landscape.
NOTICE:
Registrants are notified when courses are chosen for cancellation; this training list reflects all course availabilities and is updated regularly.
Designing Secure Protocols and Intercepting Secure Communication
// Moxie Marlinspike
This is a new and special training that covers both designing and attacking secure protocols. Attendees will learn the fundamentals of how to design a secure protocol, and be armed with the knowledge of how to evaluate the security of and discover weaknesses in existing protocols.
Hacking by Numbers: Bootcamp
// SensePost
Novice level. A highly practical course that teaches method-based hacker thinking, skills and techniques.
Hands-On Hardware Hacking and Reverse Engineering Techniques: Black Hat Edition
// Joe Grand
This course is the first of its kind and focuses entirely on hardware hacking.
Exploit Laboratory: Analyzing Vulnerabilities and Writing Exploits
// Saumil Shah
Learn how to expose the inner mechanisms of exploits and how they work. The class is highly hands-on and very lab intensive.
Information Assurance Officer (IAO) Course (CNSS-4014E) Certified
// Information Assurance Associates (IA2)
Very intense, highly concentrated, non-technical professional training necessary to achieve the fundamental knowledge needed to define, design, integrate and manage information system security policies, processes, practices, and procedures within federal interest information systems and networks.
Mac Hacking Class
// Vincenzo Iozzo & Dino Dai Zovi
The aim of this class is to provide the student with all the skills needed in order to fully perform research on this OS. Specifically how to write payloads, what are the tools needed to perform research and all the hidden oddities of OS X which other UNIX-based systems don’t have.
SAP Security In-Depth
// Mariano Nuñez Di Croce
How to secure an SAP system? How to perform a security assessment of an SAP system? These are two questions that this course will answer.
TCP/IP Weapons School 2.0
// Richard Bejtlich, TaoSecurity
Learn how networks can be abused and subverted, while analyzing the attacks, methods, and traffic that make it happen.
Ultimate Hacking: Wireless
// Brad Antoniewicz, Foundstone
Foundstone's Ultimate Hacking: Wireless class takes an in-depth look at current attacks against wireless networks. The hands-on, Linux-based class starts off with an overview of the IEEE 802.11 protocol then dives deep into hardcore attacks used in the real world.
Virtualization (In)Security
//Rafal Wojtczuk & Joanna Rutkowska July 27-28 only
An unbiased view on the security of recent Xen systems (Xen 3.3 and 3.2), show exemplary attacks and a study of how various technology (e.g. Intel VT-d and TXT) and clever design of the VMM can help to improve security.
Web Application (in)Security
// NGS Software
If you are concerned with the security of web applications and the insecurity they introduce to your back end information systems this is the workshop for you.