|
|
|
(c) 1996-2007 Black Hat
|
|
|
|
|
|
|
|
Today, more than ever, protecting the IT resources of a company against security threats is of vital importance. In order to do this, your company's professionals need to be capable of guarding your company's resources. Black Hat Training is designed to raise the professionals' competence level on specific security topics. |
|
|
|
|
|
|
One Day Courses
|
Tues, Feb 5
|
Weds, Feb 6
|
NT Network Intrusion & Windows 2000
Web Intrusion Workshop
JD Glaser, Foundstone
|
NT Network Intrusion & Windows 2000
Web Intrusion Workshop
JD Glaser, Foundstone
|
Auditing Binaries:
Reverse Engineering Windows 2000
Halvar Flake, Black Hat
|
Secure Development of Data-Driven
Web Applications
Tim Mullen, AnchorIS
|
Using Active Directory to Manage Security
Rooster
|
Advanced Scanning with ICMP
Ofir Arkin, @stake
|
|
|
Two Day Courses |
Tues- Weds, Feb 5-6
|
NSA InfoSec Assessment
Methodology Course
Security Horizon |
Ultimate Hacking:
Black Hat Edition
Foundstone |
|
|
|
|
|
Attend the Briefings, Feb 7-8, immediately following the Training. Three tracks over 2 days. Register for both Training and Briefings and receive a substantial discount. |
|
|
|
|
|
|
Hotel and Venue information for Windows Security 2002 Briefings and Training. Extraordinary low rates available from Super Bowl weekend thru Mardi Gras weekend.
|
|
|
|
|
|