BLACK HAT USA 2013 ADD A CLASS REQUEST FORM INSTRUCTIONS

Similar documents
Advanced Ethical Hacking & Penetration Testing. Ethical Hacking

CALENDAR FOR THE YEAR 2018

Advanced Diploma on Information Security

Security Testing. John Slankas

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018

Certified Cyber Security Specialist

Training on CREST Practitioner Security Analyst (CPSA)

Hacker Academy UK. Black Suits, White Hats!

ISDP 2018 Industry Skill Development Program In association with

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

CPTE: Certified Penetration Testing Engineer

Cyber Security Technologies

Certified Cyber Security Analyst VS-1160

CompTIA Security+ Study Guide (SY0-501)

Certified Ethical Hacker V9

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

How Breaches Really Happen

SensePost Training Overview 2011/2012

Certified Secure Web Application Engineer

Cyber Analyst Academy. Closing the Cyber Security Skills Gap.

DEEPER KNOWLEDGE. ADVANCED SECURITY.

CSWAE Certified Secure Web Application Engineer

Eyes Wide Open. John Sawyer Senior Security Analyst InGuardians, Inc.

EC-Council C EH. Certified Ethical Hacker. Program Brochure

ICS Penetration Testing

Pluralsight CEU-Eligible Courses for CompTIA A+ updated March 2018

Metasploit: The Penetration Tester's Guide PDF

DIS10.1 Ethical Hacking and Countermeasures

Course 831 Certified Ethical Hacker v9

Experiences with practice-focused undergraduate security education

Let's cyber: hacking, 0days and vulnerability research. PATROKLOS ARGYROUDIS CENSUS S.A.

Web Applications Penetration Testing

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

LONDON SUMMER 2016 SAT 9 SAT 16 JULY, 2016 #SANSLONDON. 14 SANS COURSES SEC566 Implementing and Auditing the Critical Security Controls- In Depth

Kaspersky Enterprise Cybersecurity. Kaspersky Security Assessment Services. #truecybersecurity

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Descriptions for CIS Classes (Fall 2017)

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

CEH: CERTIFIED ETHICAL HACKER v9

COMPUTER FORENSICS (CFRS)

DIS10.2. DIS10.2:Advanced Penetration Testing and Security Analyst Certification. Online Training Classroom Training Workshops Seminars

Cyber Risk Services Secure. Vigilant. Resilient. Deloitte Malta, Cyber

J. A. Drew Hamilton, Jr., Ph.D. Director, Center for Cyber Innovation Professor, Computer Science & Engineering

The Rise of the Purple Team

Protect Your Organization from Cyber Attacks

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

to Enhance Your Cyber Security Needs

A Passage to Penetration Testing!

DIS10.1:Ethical Hacking and Countermeasures

OWASP Romania Chapter

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

OPSEC and defense agains social engineering for devels, execs, and sart-ups

Application Security Approach

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

Application. Security. on line training. Academy. by Appsec Labs

hidden vulnerabilities

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring

Ingram Micro Cyber Security Portfolio

Hacking Exposed Wireless: Wireless Security Secrets & Colutions Ebooks Free

Modern Day Penetration Testing Distribution Open Source Platform - Kali Linux - Study Paper

Incorporating Hunt Teams To Defend Your Enterprise

CIT 480: Securing Computer Systems. Putting It All Together

CYBER SOLUTIONS & THREAT INTELLIGENCE

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs

CompTIA Cybersecurity Analyst+

Ethical Hacker Foundation and Security Analysts Course Semester 2

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

Students should have an understanding and a working knowledge in the following topics, or attend these courses as a pre-requisite:

CYBER SECURITY TRAINING

Security Stream for Computer Science

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

IE156: ICS410: ICS/SCADA Security Essentials

cs642 /introduction computer security adam everspaugh

CyberVista Certify cybervista.net

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

Certified Ethical Hacker

IMEC Cybersecurity for Manufacturers Penetration Testing and Top 10

Towards Effective Cybersecurity for Modular, Open Architecture Satellite Systems

THE EVOLUTION OF SIEM

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

4/13/2018. Certified Analyst Program Infosheet

Attack Trees Red Teaming

Maximum Security with Minimum Impact : Going Beyond Next Gen

Cyber Security Congress 2017

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

2018 Cyber Mission Training Course Catalog

Lessons from the Human Immune System Gavin Hill, Director Threat Intelligence

CCNA Cybersecurity Operations 1.1 Scope and Sequence

Security Testing. - a requirement for a secure business. ISACA DAY in SOFIA. Gabriel Mihai Tanase, Director, Cyber Services KPMG in CEE

A United States Cyber Academy Program

Proactive Defense with Automated First Responder (AFR) Anuj Soni Jason Losco

CCNA Cybersecurity Operations. Program Overview

Transcription:

Use one form per registrant. BLACK HAT USA 2013 ADD A CLASS REQUEST FORM INSTRUCTIONS This form is for those who have existing USA 2013 Training Registration and have an existing Confirmation Number. If you do not have a Confirmation Number from your online registration, you MAY NOT use this form and must register online. All seats are first come, first paid, first served. You must return this form to us no later than June 24, 2013 to bh-reg@blackhat.com or fax 1.206.219.4143 Note that some courses may be sold out and your request will be based on availability. Registrant Name Confirmation Number

BLACK HAT USA 2013 TRAINING ADD A CLASS FORM Use one form per registrant. This form is for those who have an existing USA 2013 Training Registration and have an existing Order Reference Number. If you do not have an Order Reference Number from your online registration, you MAY NOT use this form and must register online. All seats are first come, first paid, first served. You must return this form to us no later than June 24, 2013. Complete this form and return it to Email: bh-reg@blackhat.com or Fax: 1.206.219.4143 FOUR DAY TRAINING SESSIONS JULY 27-30 $4,200.00 $4,400.00 $4,600.00 Advanced Malware Analysis $4,500.00 $4,700.00 $4,900.00 Advanced Web Attacks and Exploitation $4,500.00 $4,700.00 $4,900.00 Advanced Windows Exploitation Techniques CNSS-4012/4015 Senior Systems Manager/Systems Certifier $4,650.00 $4,850.00 $5,050.00 Combination Course $4,650.00 $4,850.00 $5,050.00 CNSS-4016 Risk Analyst $3,700.00 $3,900.00 $4,100.00 Computer Forensics & Incident Response For Investigators $3,900.00 $4,100.00 $4,300.00 Digital Forensics & Incident Response $3,900.00 $4,100.00 $4,300.00 Network Forensics: Black Hat Release $4,500.00 $4,700.00 $4,900.00 Pentesting with Backtrack $3,600.00 $3,800.00 $4,000.00 Practical Arm Exploitation $4,200.00 $4,400.00 $4,600.00 Social Engineering For Penetration Testers

$3,900.00 $4,100.00 $4,300.00 Tactical Exploitation (4 Day Version) $4,200.00 $4,400.00 $4,600.00 Ultimate Hacking: Mobile $3,600.00 $3,800.00 $4,000.00 Ultimate Investigative Interviewing TWO DAY COURSES JULY 27 28 & JULY 29-30 Adaptive Penetration Testing Adaptive Red Team Tactics Advanced C/C++ Source Code Analysis Advanced OSINT Target Profiling (aka OSINT Target Profiling Like A Pro) Android Application Hacking PenTesting Mobile Apps Application Security for Hackers and Developers Assessing and Exploiting Mobile Applications with OWASP MobiSec Assessing and Exploiting Web Apps with SamuraiWTF Attacking, Defending and Building SCADA Systems Bypassing Security Defenses Secret Penetration Testing $2,300.00 $2,500.00 $2,700.00 Techniques Cloud Security Fundamentals (CCSK - Plus)

Crisis Management Cyber Intel FEAD Defensive Countermeasures: Foundations of Becoming a Devious Defender Designing Secure Protocols and Intercepting Secure Communication Digital Intelligence Gathering Using Maltego Hacking by Numbers: BlackOps Hacking by Numbers: Bootcamp Hacking by Numbers: Mobile Hacking by Numbers: Unplugged Hands-On Hardware Hacking and Reverse Engineering ICS for Pentesters Finding and Exploiting Industrial Control Systems on Enterprise Networks Incident Response: Black Hat Edition Introduction to More Advanced Steganography ios Application Hacking PenTesting Mobile Apps Java Security $2,700.00 $2,900.00 $3,100.00 $3,500.00 $3,700.00 $3,900.00

Malware Analysis: Black Hat Edition Metasploit Mastery Mobile Hacking II Network Security Monitoring 101 Network Threat Defense, Countermeasures, and Controls Offensive Countermeasures: The Art of Active Defenses Peach Fuzzer: Effective Fuzzing Peach Fuzzer: Embedded Edition (Advanced) Pentesting with Perl 2013 Real World Security: Attack, Defend, Repel Red Team Training Ruby for Pentesters: The Training Tactical Defense with ModSecurity Tactical Security Ops The IDA Pro Class $3,400.00 $3,600.00 $3,800.00 $2,700.00 $2,900.00 $3,100.00 $3,400.00 $3,600.00 $3,800.00

The Shellcode Lab The Web Application Hacker s Handbook, Live Edition Ultimate Hacking Ultimate Hacking: Human Ultimate Hacking: Wireless Visual Analytics Delivering Actionable Security Intelligence TWO DAY COURSES JULY 27 28 $2,850.00 $3,050.00 $3,250.00 Hacking by Numbers: Cadet Edition Physical Penetration Testing Advanced Software Defined Radio The Exploit Laboratory TWO DAY COURSES JULY 29 30 Building Secure Web, Mobile and Webservice Applications $2,200.00 $2,400.00 $2,600.00 Bootcamp Cyber-threats on SAP Platforms: Assess, Exploit and Defend Hacking by Numbers: Combat

Pentesting Smart Grid and SCADA with SamuraiSTFU Physical Penetration Testing Introduction RfCat Is Your Friend $3,500.00 $3,700.00 $3,900.00 Tactical Exploitation (2 Day Version) $1,800.00 $2,000.00 $2,200.00 The Art of Exploiting Injection Flaws The Exploit Laboratory: Black Belt Edition THREE DAY COURSES JULY 28 30 Uses and Misuses of Cryptography How to Use Crypto Properly and Attack Those That Don t