2016 Training

This year we are pleased to announce 1, 2 and 4 day trainings at NolaCon!

Note that the Conference runs May 20-22.

All trainings include full conference admission to NolaCon.

1- day training (May 19, 2016)

2- day training (May 16-17, 2016)

2-day training (May 18-19, 2016)

4-day training (May 16-19, 2016)

1- day training (May 19, 2016):

Malware Analysis 101 Training (1 day, May 19th)

Knowing how to perform basic malware analysis can go a long way in helping infosec analysts do some basic triage to either crush the mundane or recognize when its time to pass the more serious samples on to the the big boys. This one day course, based on grecs’ popular Malware Analysis 101 – N00b to Ninja talks, covers several analysis environment options and the three quick steps that allows almost anyone with a general technical background to go from n00b to ninja (;)) in no time. Well … maybe not a “ninja” per se but the closing does address follow-on resources on the cheap for those wanting to dive deeper into the dark world of malware analysis. (more info)

2-day training (May 16-17, 2016):

Protective Security Analyst

Security needs are evolving faster than most companies can adapt. It is critical in today’s world to have an expert who can assess facilities and operations not only against today’s adversaries, but also recognize the threats of tomorrow.
This dynamic course is ideal for any individual who is tasked to make critical security decisions for their facilities. Our industry leading experts will teach you all the necessary components of a well layered physical defense system. You will learn how to make proper changes to existing systems or work with a design team to harden new spaces. This knowledge become the framework for your next evolution: where we teach you to examine a site and perform a comprehensive security assessment. (more info)

2-day training (May 18-19, 2016):

Physical Penetration Testing (May 18th & 19th)

Physical security is an oft-overlooked component of data and system security in the technology world. While frequently forgotten, it is no less critical than timely patches, appropriate password policies, and proper user permissions. You can have the most hardened servers and network but that doesn’t make the slightest difference if someone can gain direct access to a keyboard or, worse yet, march your hardware right out the door. (more info)

Advanced Android and iOS Hands-on Exploitation (May 18th & 19th)

Advanced Android and iOS Hands-on Exploitation is a unique training which covers security and exploitation of the two most dominant mobile platforms – Android and iOS. This is a two day action packed class, full of hands-on challenges and CTF labs.  The entire class will be run on a Mobile pentesting VM which has been modified exclusively for the class and includes a huge variety of vulnerable applications and challenges. The training will take the attendees from the ground level upwards to be able to audit any real world applications on the platforms. (more info)

4-day training (May 16-19, 2016):

CISSP Training (May 16-19)

Globally recognized, CISSP is a leading certification and internationally recognized information security certification designed for information security professionals. The CISSP examination measures the competence of candidates against an internationally accepted common body of knowledge encompassing eight (8) security domains which include: Security & Risk Management, Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations and Software Development Security. (more info)

Protective Security Analyst / Physical Security Pentesting – Complete Physical Security Course (May 16th-19th)

Security needs are evolving faster than most companies can adapt. It is critical in today’s world to have an expert who can assess facilities and operations not only against today’s adversaries, but also recognize the threats of tomorrow.

From file cabinets to vault doors, we rely on locks to secure our world. In today’s digital world, this critical aspect of security is an often overlooked vector for attack. While frequently forgotten, it is no less critical than timely patches, appropriate password policies, and proper user permissions. You can have the most hardened servers and network but that doesn’t make the slightest difference if someone can gain direct access to a keyboard or, worse yet, march your hardware right out the door. Gone are the days where physical security and information security are separate disciplines. A thorough understanding of the vulnerabilities in common physical security systems, and how to exploit them, is an essential element in protecting ourselves, our information systems, and our property from harm. (more info)