Focused Black Hat 2013 Trainings Examine Incident Response, Malware

Infosec trainings aim to provide needed skills to properly respond to incidents large and small

Dark Reading Staff, Dark Reading

May 20, 2013

3 Min Read
Dark Reading logo in a gray background | Dark Reading

[NOTE: Black Hat and Dark Reading are both part of UBM Tech. As the key July 27th-August 1st information security event in Las Vegas approaches, we'll be sharing information about the show directly from its creators here on Dark Reading.]

When the attack happens, what do you do? Incident response and malware are the focus of these four featured training for Black Hat USA 2013 -- just part of the tens of available two-day and four-day infosec trainings, and they aim to give you the skills you'll need to properly respond to incidents large and small.

Verizon's 2013 DBIR indicates that 40% of breaches involved malware, and rapid analysis often falls to incident responders. Malware Analysis: Black Hat Edition provides a rapid intro to the tools and methodologies of Windows malware analysis. Attendees will learn how to observe malware's actions through disassembly and debugging, extract host and network-based indicators, and zeroing in on the Windows APIs most used by malware authors. Hands-on labs will abound, and everyone will receive a copy of Mike Sikorski's "Practical Malware Analysis."

Despite the staggering number of reported breaches in the past year, the typical IT staffer lacks the necessary and specialized training to properly respond. Digital Forensics and Incident Response takes up that slack, offering attendees both the theory behind digital forensics and hands-on experience with real-life situations and evidence. Upon the Training's completion, students will be able to effectively preserve and analyze a large number of digital evidence sources, skills that are immediately useful in a number of investigative scenarios.

More experienced attendees may prefer Network Forensics: Black Hat Release, an advanced-level Training that will touch on a dizzying array of network forensics topics and techniques. Taught by the authors of "Network Forensics: Tracking Hackers Through Cyberspace," the Training will teach packet analysis, statistical flow record analysis, wireless forensics, intrusion detection and analysis, network tunneling, malware network behavior, and more over four days of lecture and hands-on labs. Attendees will also receive exclusive, fully loaded portable forensics workstations.

Finally, Incident Response: Black Hat Edition is a special two-day Training that covers the fundamental and cutting-edge data collection and analysis techniques InfoSec pros need to investigate increasingly complex intrusion scenarios. The class is presented by Mandiant, well-known for its Incident Response coursework, and features case studies and hands-on lab exercises tailored to the latest real-world attack scenarios identified by Mandiant's investigators. By the end, attendees will know how to "scope" an incident, conduct rapid triage on potentially affected systems, detect attackers' attempts to manipulate evidence, and much more.

More information about Black Hat USA 2013, which has a rapidly growing set of Briefings talks, as well as a comprehensive set of 2 and 4-day trainings, is available now -- early, reduced-rated registration is open until May 31st.

Read more about:

Black Hat News

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights