Black Hat Europe 2014



ADVANCED WI-FI PENETRATION TESTING

 

This training is based on the best-selling book "Backtrack 5 Wireless Penetration Testing" and will provide a highly technical and in-depth treatment of Wi-Fi security. The emphasis will be to provide participants with a deep understanding of the principles behind various attacks and not just a quick how-to guide on publicly available tools.

During the course of this training participants will do over 25+ hands-on lab sessions and will fight it out against live CTF challenges. These include: cracking WPA Enterprise (PEAP, EAP-TTLS), MITM attacks over Wireless, Creating Wi-Fi Backdoors, Scripting and Attack automation, Wireless Forensics, and Security Best Practices.

 

ANALYZING PC FIRMWARE AND DETECTING BIOS/SMM ATTACKERS

PC BIOS/UEFI firmware is usually "out of sight, out of mind" but this just means it's a place where sophisticated attackers can live unseen and unfettered. This class shares information about PC firmware security that was hard-won over years of focused research into firmware vulnerabilities.

 

ATTACKING, DEFENDING, AND BUILDING SCADA SYSTEMS

This two-day course will take a deep-dive into the fundamentals of SCADA security and provide students with the knowledge that they need to safely perform penetration testing against live SCADA environments. The course will also provide students with methodologies through which security research may be performed against SCADA devices in order to identify 0-day flaws in some of the worlds most critical systems. During the course, students will have the opportunity to engage in live attacks against programmable logic controllers (PLCs) and other industrial control systems, to include activities such as SCADA RTOS firmware reversing and SCADA protocol fuzzing.

 

CLOUD SECURITY HANDS-ON (CCSK-PLUS)

 

This course provides a solid foundation in cloud security and includes a full day of hands-on labs to apply the principles in practice. We cover all the material needed to pass the Cloud Security Alliance Certificate of Cloud Security Knowledge (CCSK) exam, but add a pragmatic approach to immediately kick start your cloud security projects. For Black Hat, we also add expanded material to show you how to take cloud security to the next level by leveraging DevOps techniques and the characteristics of the cloud.

 

INCIDENT RESPONSE - BLACK HAT EDITION

This intensive two-day course is designed to teach the fundamental investigative techniques needed to respond to today's landscape of threat actors and intrusion scenarios. Completely redeveloped with all-new material in 2013, the class is built upon a series of hands-on labs that highlight the phases of a targeted attack, key sources of evidence, and the forensic analysis know-how required to analyze them.

 

 

And so much more.......

 

 

Speaker and Presenter Information


Ali Abbasi

ALI ABBASI   University of Twente, Distributed and Embedded System Security Group

Axelle Apvrille

AXELLE APVRILLE   Fortinet

Akhil Arora

AKHIL ARORA   Xerox Research Center India

View Exhibitor/Sponsorship Details


When
Tue-Fri, Oct 14-17, 2014


Where
Amsterdam RAI Exhibition and Convention Centre
Europaplein, 1078 GZ
Amsterdam, Netherlands BR
Get directions


Website
Click here to visit event website


Event Sponsors


Organizer
UMB Tech


Contact Event Organizer



Return to search results