{"id":825,"date":"2015-06-03T09:05:00","date_gmt":"2015-06-03T09:05:00","guid":{"rendered":"https:\/\/www-new.brucon.org\/2018\/2015\/06\/03\/brucon-0x07-training-track-complete\/"},"modified":"2015-06-03T09:05:00","modified_gmt":"2015-06-03T09:05:00","slug":"brucon-0x07-training-track-complete","status":"publish","type":"post","link":"https:\/\/archive.brucon.org\/2018\/2015\/06\/03\/brucon-0x07-training-track-complete\/","title":{"rendered":"BruCON 0x07 Training track complete"},"content":{"rendered":"<p><span style=\"color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.7999992370605px\">We are proud to present to you our complete training track for this 0x07 edition of BruCON.&nbsp;<\/span><br \/><span style=\"color: #333333;font-family: Georgia, serif\"><span style=\"font-size: 13px;line-height: 20.7999992370605px\"><br \/><\/span><\/span><span style=\"color: #333333;font-family: Georgia, serif\"><span style=\"font-size: 13px;line-height: 20.7999992370605px\">The line-up! :&nbsp;<\/span><\/span><\/p>\n<ul>\n<li><span style=\"color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.7999992370605px\"><b>Practical Malware Analysis: Rapid Introduction<\/b>&nbsp;by &nbsp;Andrew Honig (3 day training) :&nbsp;<\/span><span style=\"color: #333333;font-family: Georgia, serif\"><span style=\"font-size: 13px;line-height: 20.7999992370605px\">One of BruCONs most popular trainings is back. The co-author of the book will be hosting one of our most popular training tracks.&nbsp;Students also get a free copy of Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software.&nbsp;<\/span><\/span><\/li>\n<li><span style=\"color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.7999992370605px\"><b>Tactical Exploitation and Response<\/b>&nbsp;by Russ Gideon (3 day training) : Russ, being the Director of Training and Malware Research at Attack Research bring along a ton of experience and a well balanced program for tactical exploitation and response.<\/span><\/li>\n<li><b style=\"color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.7999992370605px\">Hacking web applications \u2013 case studies of award-winning bugs in Google, Yahoo, Mozilla and more<\/b><span style=\"color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.7999992370605px\">&nbsp;by Dawid Czagan (2 day training) : Have you ever thought of hacking web applications for fun and profit? How about playing with authentic, award-winning security bugs identified in some of the greatest companies? If that sounds interesting, join this two-day hands-on training!<\/span><\/li>\n<li><span style=\"color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.7999992370605px\"><b>Wireshark WiFi and Lua-Packet Class<\/b>&nbsp;by Didier Stevens (2 day training) : Wireshark is the number one network security tool according to SecTools.org top 125 Network Security Tools survey. But did you ever spend time to familiarize yourself with the many powerful features of this excellent security tool? If you did not, then now is your chance to learn as much as you can in this class and receive your complementary AirPcap adapter for Windows.<\/span><\/li>\n<li><span style=\"color: #333333;font-family: Georgia, serif\"><span style=\"font-size: 13px;line-height: 20.7999992370605px\"><b>Cyber Breach Management <\/b>by Chris Nutt (3 day training) :&nbsp;This course will teach students how to successfully manage the people, processes, and voluminous data required to successfully investigate and recover from a breach. All phases of the incident response process will be covered and hands-on exercises will provide tools for analyzing system artifacts as well as scrutinizing and communicating technical findings.<\/span><\/span><\/li>\n<li><span style=\"color: #333333;font-family: Georgia, serif\"><span style=\"font-size: 13px;line-height: 20.7999992370605px\"><b>Offensive IoT Exploitation<\/b> by Aditya Gupta and Aseem Jakhar (3 day training) : A brand new and unique course which offers penetration testers the ability to assess the security of &nbsp;smart devices.&nbsp;The training will cover assessing IoT attack surfaces and finding security issues.&nbsp;<\/span><\/span><\/li>\n<li><span style=\"color: #333333;font-family: Georgia, serif\"><span style=\"font-size: 13px;line-height: 20.7999992370605px\"><b>Assessing and Exploiting Control Systems<\/b> by Don C. Weber (3 day training) :&nbsp;This is not your traditional SCADA security course! How many courses send you home with your own PLC and a set of hardware\/RF hacking tools?!? This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded electronic field devices, network protocols, RF communications, and master servers.<\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.7999992370605px\">The training location will be&nbsp;<\/span><a href=\"http:\/\/www.accorhotels.com\/gb\/hotel-0840-novotel-gent-centrum\/index.shtml\" style=\"font-family: Georgia, serif;font-size: 13px;line-height: 20.7999992370605px\" target=\"_blank\">Novotel Ghent Centrum<\/a><span style=\"color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.7999992370605px\">.<\/span><br \/><span style=\"color: #333333;font-family: Georgia, serif\"><span style=\"font-size: 13px;line-height: 20.7999992370605px\"><br \/><\/span><\/span><span style=\"color: #333333;font-family: Georgia, serif\"><span style=\"font-size: 13px;line-height: 20.7999992370605px\">All training details and registration links can be found on the BruCON training pages (<a href=\"http:\/\/2015.brucon.org\/index.php\/Training\" target=\"_blank\" class=\"broken_link\">link<\/a>).&nbsp;<\/span><\/span><span style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><b>Early Bird registration<\/b><\/span><span style=\"background-color: white;color: #333333;font-family: Georgia, serif;font-size: 13px;line-height: 20.8000011444092px\"><b>&nbsp;is possible until the 1st of August<\/b> &nbsp;and be found <a href=\"https:\/\/registration.brucon.org\/training-registration\/\" target=\"_blank\" class=\"broken_link\">here<\/a><\/span><br \/><span style=\"color: #333333;font-family: Georgia, serif\"><span style=\"font-size: 13px;line-height: 20.7999992370605px\"><br \/><\/span><\/span><span style=\"color: #333333;font-family: Georgia, serif\"><span style=\"font-size: 13px;line-height: 20.7999992370605px\">your BruCON team.<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are proud to present to you our complete training track for this 0x07 edition of BruCON.&nbsp;The line-up! :&nbsp; Practical Malware Analysis: Rapid Introduction&nbsp;by &nbsp;Andrew Honig (3 day training) :&nbsp;One of BruCONs most popular trainings is back. The co-author of the book will be hosting one of our most popular training tracks.&nbsp;Students also get a free copy of Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software.&nbsp; Tactical Exploitation and Response&nbsp;by Russ Gideon (3&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-825","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized"},"menu_order":0,"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/comments?post=825"}],"version-history":[{"count":0,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/825\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/media?parent=825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/categories?post=825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/tags?post=825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}