SEARCH
TOOLBOX
LANGUAGES
Difference between revisions of "Training"

Difference between revisions of "Training"

From BruCON 2017

Jump to: navigation, search
Line 1: Line 1:
__NOTOC__
+
Trainings are not available yet. See below to follow updates.
  
There will be trainings in the days prior to BruCON (22-23 Sept) , by internationally renowned trainers and at good prices. If you were looking for the conference presentations, see the [[Schedule]].
+
== Latest news ==
 +
<rss>http://blog.brucon.org/feeds/posts/default?alt=rss|charset=UTF-8|date|max=5</rss><br>
  
==Registration details==
+
<b>'''You can also follow BruCON news on [[Image:Blogger_logo.jpg|55px|link=http://blog.brucon.org]],[[Image:Twitter_logo.jpg|50px|link=http://twitter.com/brucon]], [[Image:Mailing_logo.jpg|50px|link=http://mailman.brucon.org/mailman/listinfo/]] or [[Image:Linkedin_logo.jpg|55px|link=http://www.linkedin.com/groups?gid=1777141]].''</b>'''
 
 
 
 
The price for the 2 day courses is € 900 (+ VAT) per attendee.
 
 
 
Please send an e-mail to '''registrations at brucon.org''' with the following information:
 
 
 
* Name:
 
* E-mail:
 
* The course name:
 
 
 
You will receive a mail with your registration number and payment instructions (bank wire or PayPal). Upon reception of your payment, you will get your final registration confirmation. If you don't receive your payment instructions within 48h, please contact us at  '''helpdesk (at) brucon.org'''
 
 
 
==Location & Date==
 
 
 
The courses will be given on 22 & 23 September in Belgacom University (BCU), Carlistraat 2, B-1140 Evere. ([http://maps.google.be/maps?f=q&source=s_q&hl=nl&geocode=&q=Carlistraat+2+B-1140+Evere&sll=50.805935,4.432983&sspn=5.075643,11.195068&ie=UTF8&z=16&iwloc=A Google Maps Link])
 
 
 
The courses start at 9h00 and end at 17h00.
 
 
 
==Overview of the courses==
 
===Pentesting High Security Environments===
 
This course will focus on penetration testing techniques that can be used when testing
 
highly secured environments such as 3-letter agencies, DoD, financial organizations,
 
federal organizations, and large companies. If you are tired of attacking unpatched
 
Windows 2000 Servers in your hacking courses and want to take a course where you will
 
be attacking new Operating Systems/Applications that are patched, locked down, and
 
protected with an IDS/IPS then this is the course for you.
 
 
 
The first day of the course starts with attacking heavily protected environments from the
 
outside and dealing with Network-Based IDS/IPS. Next is attacking web applications and
 
dealing with Load Balancing, common application security measures in PHP/ASP.NET,
 
and Web Application Firewalls.
 
 
 
The second day covers attacking from the LAN, dealing with NAC solutions, locked
 
down workstations/GPOs, and Host-Based IDS/IPS. The last section of the course covers
 
gaining control of Active Directory.
 
 
 
====Instructors====
 
[[Training_1| Joe McCray ]]
 
 
 
====Description====
 
'''For more details see [[Training 1| Pentesting High Security Environments]]'''
 
 
 
==== Pricing====
 
The price for this 2 day course is € 900 (+ VAT).
 
 
 
===A crash course in pentesting VOIP networks===
 
====Instructor====
 
[[Training_2#About_course_designer_and_instructor | Joffrey Czarny and Sandro Gauci ]]
 
 
 
====Description====
 
The training is to learn the risks and the weaknesses VoIP and how to pentest them. Besides reviewing default configuration mistakes, you will learn about VLAN hopping, fingerprinting, SIP abuse, wiretapping, covert channels, denial of service attacks and VOIP webapplication issues.
 
 
 
 
 
'''For more details see [[Training 2| ]]'''
 
 
 
==== Pricing====
 
The price for this 2 day course is € 900 (+ VAT).
 
 
 
 
 
===Training 3===
 
====Instructors====
 
[[Training_3| ]]
 
 
 
====Description====
 
 
 
 
 
 
'''For more details see [[Training 3| ]]'''
 
 
 
==== Pricing====
 
The price for this 2 day course is € 900 (+ VAT).
 

Revision as of 01:21, 12 February 2010

Trainings are not available yet. See below to follow updates.

Latest news

<rss>http://blog.brucon.org/feeds/posts/default?alt=rss%7Ccharset=UTF-8%7Cdate%7Cmax=5</rss>

You can also follow BruCON news on Blogger logo.jpg,Twitter logo.jpg, Mailing logo.jpg or Linkedin logo.jpg.