category - black hat

1
USA 2012 training auditing & assessment app sec & dev network certication physical security cryptography reverse engineering forensics sys admin hardware virtualization malware analysis vuln & exploit dev managerial/policy course name CATEGORY Adaptive Penetration Testing by Veris Group (Four Day) X Adv. Malware Analysis by MANDIANT (Four Day) X X Adv. Memory Forensics in Incident Response by Jamie Butler & Peter Silberman X Adv. Web Attacks and Exploitation by Offensive Security (Four Day) X X Adv. Windows Exploitation Techniques by Offensive Security (Four Day) X X An Introduction to More Advanced Steganography by John A Ortiz X Application Security: For Hackers and Developers by Jared DeMott X The Art of Exploiting SQL Injection by Sumit Siddharth X X Assessing and Exploiting Web Applications with Samurai-WTF by Justin Searle & Kevin Johnson X X Building, Attacking and Defending SCADA Systems by Tom Parker & Jonathan Pollet X X X CNSS-4012 Senior System Manager/CNSS-4015 System Certifier Combination Course by IA2 (Four Day) X X CNSS-4016 Risk Analyst by Information Assurance Associates (IA2) X X Crisis Management by Peak Security, INC X X Cyber Network Defense Bootcamp by Adam Meyers X X X Designing Secure Protocols and Intercepting Secure Communications by Moxie Marlinspike X X Detecting & Mitigating Attacks Using Network Infrastructure By Cisco X Digital Forensics and Incident Response by Andrew Case & Jamie Levy X Digital Intelligence Gathering Using Maltego by Paterva X Effective Fuzzing: Using the Peach Fuzzing Platform by Deja Vu Security X X Enterprise Security from Day 1 to Completion by Chris Conacher X Exploit Laboratory By Saumil Shah & S.K. Chong X X Exploit Laboratory: Black Belt Edition by Saumil Shah & S.K. Chong X X Hacking By Numbers: BlackOps Edition by Sensepost X Hacking By Numbers: Bootcamp by Sensepost X Hacking by Numbers: Cadet by Sensepost X Hacking By Numbers: Combat by Sensepost X Hacking by Numbers: Unplugged by Sensepost X X Hacking by Numbers: W^3 by Sensepost X X Hands-On Hardware Hacking & Reverse Engineering Techniques by Joe Grand X X IDA Pro Class: Reverse Engineering with IDA Pro by Chris Eagle X Incident Response: Black Hat Edition by MANDIANT X X X Infrastructure Attacktecs & Defentecs: Hacking Cisco Networks by Steve Dugan X X Inside and Out of the Social-Engineer Toolkit by David Kennedy X X X Malware Analysis: Black Hat Edition by MANDIANT X Mobile Hacking II by HotWAN X X Modern Botnets by Ken Baylor X X Network Forensics by Jonathan Ham & Sherri Davidoff X X Offensive Countermeasures: Defensive Tactics that Actually Work by PaulDotCom X X X Pentesting with BackTrack by Offensive Security (Four Day) X X Pentesting with Perl by Joshua Abraham (One Day) X Physical Penetration Testing: Advanced by The CORE Group X X Physical Penetration Testing: Introduction by The CORE Group X X Practical ARM Exploitation by Stephen Ridley & Stephen Lawler X X Real World Security: Attack, Defend, Repel by Peak Security X X X SAP Security In-Depth by Onapsis X X The Shellcode Lab by Ty Miller X Social Engineering for Penetration Testers by White Hat Defense X X X Tactical Exploitation by Val Smith X X X X Tactical Defense by Josh Amishav-Zlatin X X X Tampering with Security Seals by The CORE Group X TCP/IP Weapons School 3.0 by Richard Bejtlich X Ultimate Hacking: Black Hat Edition by Foundstone X Ultimate Hacking: Malware Forensics & Incident Response by Foundstone X X X Ultimate Hacking: Wireless Edition by Foundstone X X Uses and Misuses of Cryptography by Andrew Lindell (Three Day) X Virtualization for Incident by Eric Fiterman X X The Web App Hacker’s Handbook, 2nd Edition: LIVE! by Dafydd Stuttard & Marcus Pinto X X

Upload: others

Post on 09-Feb-2022

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CATEGORY - Black Hat

USA 2012 training

auditing &

assessm

ent

app sec &

dev

network

certiÞc

ation

physic

al securit

y

crypto

graphy

revers

e engin

eering

fore

nsics

sys a

dmin

hardw

are

virtualiz

ation

malw

are a

nalysis

vuln &

explo

it dev

manageria

l/polic

y

course name

CATEGORYAdaptive Penetration Testing by Veris Group (Four Day) XAdv. Malware Analysis by MANDIANT (Four Day) X XAdv. Memory Forensics in Incident Response by Jamie Butler & Peter Silberman

X

Adv. Web Attacks and Exploitation by Offensive Security (Four Day) X XAdv. Windows Exploitation Techniques by Offensive Security (Four Day) X XAn Introduction to More Advanced Steganography by John A Ortiz XApplication Security: For Hackers and Developers by Jared DeMott XThe Art of Exploiting SQL Injection by Sumit Siddharth X X

Assessing and Exploiting Web Applications with Samurai-WTFby Justin Searle & Kevin Johnson

X X

Building, Attacking and Defending SCADA Systemsby Tom Parker & Jonathan Pollet X X X

CNSS-4012 Senior System Manager/CNSS-4015 System Certifier Combination Course by IA2 (Four Day) X X

CNSS-4016 Risk Analyst by Information Assurance Associates (IA2) X XCrisis Management by Peak Security, INC X XCyber Network Defense Bootcamp by Adam Meyers X X XDesigning Secure Protocols and Intercepting Secure Communicationsby Moxie Marlinspike

X X

Detecting & Mitigating Attacks Using Network Infrastructure By Cisco XDigital Forensics and Incident Response by Andrew Case & Jamie Levy X

Digital Intelligence Gathering Using Maltego by Paterva X Effective Fuzzing: Using the Peach Fuzzing Platformby Deja Vu Security

X X

Enterprise Security from Day 1 to Completion by Chris Conacher XExploit Laboratory By Saumil Shah & S.K. Chong X XExploit Laboratory: Black Belt Edition by Saumil Shah & S.K. Chong X X

Hacking By Numbers: BlackOps Edition by Sensepost XHacking By Numbers: Bootcamp by Sensepost XHacking by Numbers: Cadet by Sensepost XHacking By Numbers: Combat by Sensepost XHacking by Numbers: Unplugged by Sensepost X X

Hacking by Numbers: W^3 by Sensepost X XHands-On Hardware Hacking & Reverse Engineering Techniques by Joe Grand

X X

IDA Pro Class: Reverse Engineering with IDA Pro by Chris Eagle XIncident Response: Black Hat Edition by MANDIANT X X XInfrastructure Attacktecs & Defentecs: Hacking Cisco Networks by Steve Dugan

X X

Inside and Out of the Social-Engineer Toolkit by David Kennedy X X XMalware Analysis: Black Hat Edition by MANDIANT XMobile Hacking II by HotWAN X XModern Botnets by Ken Baylor X XNetwork Forensics by Jonathan Ham & Sherri Davidoff X XOffensive Countermeasures: Defensive Tactics that Actually Workby PaulDotCom X X X

Pentesting with BackTrack by Offensive Security (Four Day) X XPentesting with Perl by Joshua Abraham (One Day) X

Physical Penetration Testing: Advanced by The CORE Group X XPhysical Penetration Testing: Introduction by The CORE Group X X

Practical ARM Exploitation by Stephen Ridley & Stephen Lawler X XReal World Security: Attack, Defend, Repel by Peak Security X X XSAP Security In-Depth by Onapsis X X

The Shellcode Lab by Ty Miller XSocial Engineering for Penetration Testers by White Hat Defense X X XTactical Exploitation by Val Smith X X X XTactical Defense by Josh Amishav-Zlatin X X XTampering with Security Seals by The CORE Group XTCP/IP Weapons School 3.0 by Richard Bejtlich XUltimate Hacking: Black Hat Edition by Foundstone XUltimate Hacking: Malware Forensics & Incident Response by Foundstone

X X X

Ultimate Hacking: Wireless Edition by Foundston e X XUses and Misuses of Cryptography by Andrew Lindell (Three Day) XVirtualization for Incident by Eric Fiterman X XThe Web App Hacker’s Handbook, 2nd Edition: LIVE!by Dafydd Stuttard & Marcus Pinto

X X