TRAINING

5/10 | GORUCK Constellation Custom (One-Day-Course) 

Trains you to be a hard target and a protector of what you hold dear. This is not an "offensive" event by design. Firearms and combatives training are not part of this event. You and your cell will move throughout the city with a rucksack of supplies and learn what escape and evasion looks and feels like in a time of chaos. Once you see the constellations, you know exactly how to find them no matter where you are. This knowledge makes you a hard target. Upon successful completion, you’ll earn the GORUCK CONSTELLATION patch, which will never be for sale.

Don't miss this mission.

(One-Day-Course) | $295pp | Instructor: Mr. Mickey B

 

Course Syllabus


5/9 Web Hacking Jutsu with Burp Suite - Genin Level (下忍)

● Introduction to and hands-on use of Burp Suite Professional

● Gain first-hand experience with web vulnerabilities by discovering and exploiting them in web apps, using both manual and automated techniques

● Students will leave with an understanding of how to find and exploit the most common and dangerous flaws in web applications

● Begin working through the OWASP Testing Guide as a methodology for how to test app security

(One-Day Course) | $995pp | Instructor: David Rhoades

Course Syllabus


5/9-5/10 | Secure Coding in C and C++ 

Secure Coding Training in C and C++ provides a detailed explanation of common programming errors in C and C++ and describes how these errors can lead to code that is vulnerable to exploitation. This course concentrates on security issues intrinsic to the C and C++ programming languages and associated libraries. 

(One-Day Course) | $1500pp | Instructor: Prof. Robert Seacord

 Course Syllabus


5/9 | Radicalization and Counter/Cyber Jihadist Operations Analyst

The end state of CSFI's unique Radicalization and Counter/Cyber Jihadist Operations Analyst (RCCJOA) training and certification is to support the warfighter, the intelligence community, and law enforcement to strategically defeat terrorist organizations and their affiliates and adherents through the use of cyberspace.

(One-Day-Course) | $1300pp | Instructor: Mubin Shaikh

Course Syallbus


5/9-5/10 | Firmware Exploitation and Attack Countermeasures 

The IoT Firmware Exploitation and Attack Countermeasures training is designed to provide techniques for testing of embedded IoT systems, employing proactive controls, embedded application security best practices, and address the challenges of building security into embedded devices. This course is suited for embedded systems engineers, software developers, and security professionals.

(Two-Day-Course) $1500pp Instructor: Aaron Guzman

Course Syllabus


5/9-5/10 | STORM-HACKING

Module 01: - Introducing The STORM!
Module 02: - Network Security Threats, Vulnerabilities, and Attacks
Module 03: - Network Traffic Monitoring and Analysis
Module 04: - Network Risk and Vulnerability Management
Module 05: - Introduction to Ethical Hacking 
Module 06: – Footprinting 
Module 07: – Scanning
Module 08: – Enumeration 
Module 09: – System Hacking/Hacking Wireless Networks 
 

(Two-Day-Course) $1995pp Instructor: Kevin Cardwell

Course Syllabus



5/10 | Industrial Control Systems (ICS)

What Students Will Learn:

·      Introduction to commonly used field devices used in various industries. Students will be introduced to old-school devices and the latest generation and why it matters.

·      PLC, PAC, DCS, IED, RTU, what are these and what do they do?

·      Is everything on the plant floor really insecure?

·      What can be done to secure what is in your plant already.

(One-Day-Course) | $1000pp | Instructor: Tom Vannorman

Course Syllabus



5/10 | Physical Security Attacks and Mitigations (One-Day-Course) 

The instructors for this class are practicing covert entry specialists. Those who attend this course will leave with a full awareness of how to best protect buildings and grounds from unauthorized access, as well as how to compromise most existing physical security in order to gain access themselves. Our subject matter experts will immerse you in all the necessary components of a well-layered physical defense system and then teach you how to conduct a thorough site analysis of your facility.

This training is ideal for any individual who is tasked with making physical security decisions for existing or new sites.  Attendees will not only learn how to distinguish good locks and access control from poor ones and will become well-versed in picking and bypassing many of the most common locks in order to assess their own institution's security posture or to augment their career as a penetration tester.

(One-Day-Course) | $1200pp | Instructor: Deviant Ollam

Course Syllabus