|
|
(120 intermediate revisions by 5 users not shown) |
Line 1: |
Line 1: |
| + | __NOTOC__ |
| | | |
− | There will be training sessions in the days prior to BruCON (22-23 Sept) , by internationally renowned trainers and at good prices. Seats are limited so don't wait to register!
| + | <div style="text-align: left;"> |
| | | |
− | <b> Pre-registrations are only possible till the 17th of September. Register in time if you want to be sure to be able to attend the courses. </b>
| + | Immerse yourself into the world of pen testing and application security by attending the BruCON 2015 Trainings (5-7 October). |
| | | |
− | ==Registration details==
| + | Offering world-class, deep-dive technical trainings given by '''the most recognized experts''' with huge industry experience in their domain! |
| | | |
− | The price for the 2 day courses is 895 € early bird (+ VAT) per attendee. After 1st of July this will become 995 €. | + | The Line-Up: |
| + | * [[Training 2015 - Practical Malware Analysis - Rapid Introduction|Practical Malware Analysis: Rapid Introduction by Andrew Honig]] (3 day training) |
| + | * [[Training 2015 - Tactical Exploitation and Response|Tactical Exploitation and Response by Colin Ames]] (3 day training) |
| + | * [[Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more|Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more by Dawid Czagan]] (2 day training) |
| + | * [[Training 2015 - Wireshark WiFi and Lua-Packet Class|Wireshark WiFi and Lua-Packet Class by Didier Stevens *]] (2 day training) |
| + | * <strike> Cyber Breach Management by Chris Nutt (3 day training) </strike> - Cancelled |
| + | * [[Training 2015 - Offensive IoT Exploitation|Offensive IoT Exploitation by Aditya Gupta and Aseem Jakhar]] (3 day training) |
| + | * [[Training 2015 - Assessing and Exploiting Control Systems|Assessing and Exploiting Control Systems by Justin Searle **]] (3 day training) |
| | | |
− | ==Location & Date==
| + | Best motivation for training: ''"The only thing worse than training your employees and having them leave, is not training them and having them stay!"'' |
| | | |
− | The courses will be given on 22 & 23 September in Belgacom University (BCU), Carlistraat 2, B-1140 Evere. ([http://maps.google.be/maps?f=q&source=s_q&hl=nl&geocode=&q=Carlistraat+2+B-1140+Evere&sll=50.805935,4.432983&sspn=5.075643,11.195068&ie=UTF8&z=16&iwloc=A Google Maps Link]) | + | ==Registration details== |
| + | The price for 2 day courses is 1100 Euro early bird (+ VAT) per attendee. <br> |
| + | As of August 1st 2015 this will become 1200 Euro (+ VAT) per attendee. <br> |
| + | (*) The Wireshark Wireless training price is 175 Euro higher but includes an AirPCap Card. |
| | | |
− | The courses start at 9h00 and end at 17h00. | + | The price for 3 day courses is 1400 Euro early bird (+ VAT) per attendee. <br> |
| + | As of August 1st 2015 this will become 1500 Euro (+ VAT) per attendee. <br> |
| + | (**) The Assessing and Exploiting Control Systems training price is 180 Euro higher but includes a PLC and a hardware/RF testing kit |
| | | |
− | Lunch is included in the training fee.
| + | Registration for Trainings: |
| | | |
− | ==Overview of the courses== | + | [[File:Register.jpg||link=https://registration.brucon.org/training-registration/]] |
− | <hr>
| |
− | ===Training #1: Pentesting High Security Environments===
| |
− | ====Description====
| |
− | This course will focus on penetration testing techniques that can be used when testing
| |
− | highly secured environments such as 3-letter agencies, DoD, financial organizations,
| |
− | federal organizations, and large companies. If you are tired of attacking unpatched
| |
− | Windows 2000 Servers in your hacking courses and want to take a course where you will
| |
− | be attacking new Operating Systems/Applications that are patched, locked down, and
| |
− | protected with an IDS/IPS then this is the course for you.
| |
| | | |
− | The first day of the course starts with attacking heavily protected environments from the | + | The training price does not include travel, accommodation or computer material for the training unless otherwise stated in the training description or preparation material provided after registration. Please read carefully any communication that will be sent to you in regard to the training you've registered for because they will outline what you need to bring to get the most out of each training. |
− | outside and dealing with Network-Based IDS/IPS. Next is attacking web applications and
| |
− | dealing with Load Balancing, common application security measures in PHP/ASP.NET,
| |
− | and Web Application Firewalls.
| |
| | | |
− | The second day covers attacking from the LAN, dealing with NAC solutions, locked | + | ==Location and dates== |
− | down workstations/GPOs, and Host-Based IDS/IPS. The last section of the course covers
| + | The courses will be given on 5, 6 and 7 October in Hotel Novotel Gent Centrum, Goudenleeuwplein 5, B-9000 Gent<br> |
− | gaining control of Active Directory.
| |
| | | |
− | ====Instructor====
| + | The courses begin promptly at 09h00 and end at 17h00. Out of consideration for your instructor(s) and fellow students, please try to be seated and ready to go by 08h45. |
− | [[Training_1#Instructors| Joe McCray ]]<br><br>
| |
− | '''For more details see [[Training_1#description| Pentesting High Security Environments]]'''
| |
| | | |
− | ==== Pricing====
| + | Lunch is included in the training fee. |
− | The price is 895 € early bird (+ VAT) per attendee. After 1st of July this will become 995 €.
| |
− | | |
− | <hr>
| |
− | | |
− | ===Training #2: A crash course in pentesting and securing VOIP networks===
| |
− | ====Description====
| |
− | As VoIP networks become more and more part of the way organizations communicate, security professionals need to understand their strengths and weaknesses. This knowledge will help them make sound decisions on the security (or lack of) of their VoIP system and network.
| |
− | | |
− | Attendees who follow the VoIP security training will gain valuable hands-on experience in testing VoIP equipment and networks. During the training they will make use of existent security tools as well as custom built tools to help them get the job done.
| |
− | | |
− | ====Instructor====
| |
− | [[Training_2#Instructors | Joffrey Czarny and Sandro Gauci ]]<br><br>
| |
− | '''For more details see [[Training 2#description | A crash course in pentesting and securing VOIP networks ]]'''
| |
− | | |
− | ==== Pricing====
| |
− | The price is 895 € early bird (+ VAT) per attendee. After 1st of July this will become 995 €.
| |
− | | |
− | ===Training #3: Social engineering===
| |
− | ====Description====
| |
− | | |
− | <blockquote>''In 2007, one of the biggest diamond robberies ever found place. The thief used no violence. He used one weapon -- his charm -- to gain confidence. He bought chocolates for the personnel, he was a nice guy, he charmed them, got the original of keys to make copies and got information on where the diamonds were. You can have all the safety and security you want, but if someone uses their charm to mislead people it won't help.''</blockquote>
| |
− | | |
− | Social engineering attacks can have disastrous consequences, both financially and reputationally. You can have the best technical security controls in the world, from the most expensive firewall to the most sophisticated biometrics, but they will not protect you from a social engineering attack. In any security programme people are the weakest link. Social engineering tests can be used to evaluate and strengthen this link.
| |
− | | |
− | Like any penetration test, social engineering tests can help to identify security weaknesses that could allow your IT systems to be compromised. Such tests can:
| |
− | | |
− | * Give a good indication of and even improve your staff’s level of security awareness
| |
− | * Teach your staff how to identify and deal with social engineering situations
| |
− | * Provide valuable recommendations on both security awareness and physical security
| |
− | | |
− | However, it can be difficult to know how to conduct a social engineering test. This two-day training course will teach participants how to conduct an ethical social engineering test, the theory behind social engineering, as well as giving recommendations on how to defend against social engineers. The course will include practical exercises and is open to anyone with an interest in social engineering.
| |
− | | |
− | ====Instructors====
| |
− | [[Training_3#Instructors | Martin Law and Sharon Conheady]]<br><br>
| |
− | '''For more details see [[Training_3#description | Social Engineering]]'''
| |
− | ==== Pricing====
| |
− | The price is 895 € early bird (+ VAT) per attendee. After 1st of July this will become 995 €.
| |
− | ===Training #4: Assessing and Exploiting Web Applications with Samurai-WTF===
| |
− | ====Description====
| |
− | Come take the official Samurai-WTF training course given by one of the founders and lead developers of the project! You will learn how to use the latest Samurai-WTF open source tools and the be shown the latest techniques to perform web application assessments. After a quick overview of pen testing methodology, the instructor will lead you through the penetration and exploitation of three different web applications, and the browsers connecting to them. Different sets of open source tools will be used on each web application, allow you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a fourth web application that contains keys you must find and collect. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence necessary to perform web application assessments and expose you to the wealth of freely available open source tools.
| |
− | | |
− | ====Instructor====
| |
− | [[Training_4#Instructor | Justin Searle]]<br><br>
| |
− | '''For more details see [[Training_4#Description | Assessing and Exploiting Web Applications with Samurai-WTF]]'''
| |
− | | |
− | ===Training #5: Advanced Vulnerability Scanning Techniques Using Nessus===
| |
− | ====Description====
| |
− | This course teaches advanced scanning techniques by using a real-world scenario to demonstrate how these techniques help to solve problems in an example work environment. In this course you (or you and your team) will take on the role of a brand new security engineer for a financial company. You will be tasked with configuring and auditing a system to be used within your network environment. The system, and associated applications, make up the environment used to manage the business. Currently, the old systems are in place and an upgrade is planned. The current vulnerability scanning process takes over a week to complete and there is duplication of effort and a known false positive rate. Additionally, breaches have occurred on the network and your company is in jeopardy of being fined due to compliance violations. The vulnerability management process is missing vulnerabilities that were exploited by attackers. A sample system has been provided for you, that exactly mirrors what will be used in production, right down to the passwords and configuration.
| |
− | | |
− | ====Instructor====
| |
− | [[Training_5#Instructor | Paul Asadoorian]]<br><br>
| |
− | '''For more details see [[Training_5#Description | Advanced Vulnerability Scanning Techniques Using Nessus]]'''
| |
Immerse yourself into the world of pen testing and application security by attending the BruCON 2015 Trainings (5-7 October).
Offering world-class, deep-dive technical trainings given by the most recognized experts with huge industry experience in their domain!
The Line-Up:
Best motivation for training: "The only thing worse than training your employees and having them leave, is not training them and having them stay!"
Registration details
The price for 2 day courses is 1100 Euro early bird (+ VAT) per attendee.
As of August 1st 2015 this will become 1200 Euro (+ VAT) per attendee.
(*) The Wireshark Wireless training price is 175 Euro higher but includes an AirPCap Card.
The price for 3 day courses is 1400 Euro early bird (+ VAT) per attendee.
As of August 1st 2015 this will become 1500 Euro (+ VAT) per attendee.
(**) The Assessing and Exploiting Control Systems training price is 180 Euro higher but includes a PLC and a hardware/RF testing kit
Registration for Trainings:
The training price does not include travel, accommodation or computer material for the training unless otherwise stated in the training description or preparation material provided after registration. Please read carefully any communication that will be sent to you in regard to the training you've registered for because they will outline what you need to bring to get the most out of each training.
Location and dates
The courses will be given on 5, 6 and 7 October in Hotel Novotel Gent Centrum, Goudenleeuwplein 5, B-9000 Gent
The courses begin promptly at 09h00 and end at 17h00. Out of consideration for your instructor(s) and fellow students, please try to be seated and ready to go by 08h45.
Lunch is included in the training fee.