Training Security Nerds: Computum deos ab hominibus Xeno Kovah.

Slides:



Advertisements
Similar presentations
Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.
Advertisements

New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Peter Coddington CEO ::
© 2014 Fair Isaac Corporation. Confidential. This presentation is provided for the recipient only and cannot be reproduced or shared without Fair Isaac.
Presented by Benno Marbach Charleston Sin Emily Chang William Cheng.
A Social Networking Site for Scientists and Engineers Nancy Raffaele Jenifer Neubauer Yogita Ahire Jenny Li.
A Examination of Personalized Search Strategies CHIA-HAO, SHIH COMS E6125 April, 13, 2010.
D-OSDi + Android Progress Presentation Xinyi Dong Long Qiu.
© Network Ltd 2006 Social Bookmarking in the Work Place Network Ltd Ryan Butler David Gould
Secure Software Development Security Operations Chapter 9 Rasool Jalili & M.S. Dousti Dept. of Computer Engineering Fall 2010.
Innovation just got a whole lot easier. Yammer makes it easier than ever to connect knowledge, effort, and know-how, all in one place. Connect with.
4/27/2006Education Technology Presentation Visual Grid Tutorial PI: Dr. Bina Ramamurthy Computer Science and Engineering Dept. Graduate Student:
BUSINESS SOLUTION THROUGH INSIGHT SOLVING BUSINESS CHALLENGES THROUGH INSIGHT.
CLOUD COMPUTING.
Advantages and Disadvantages of Technology
Reverse Mortgages. What is a reverse mortgage? Traditional ways to receive cash from your home:
Officer’s Training 2014 Growing Your People: Awards and Recognition IEEE-SCV Officers Training, January 2014 Tom Coughlin, Coughlin Associates Director.
Website Hardening HUIT IT Security | Sep
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
Copyright © IRI, Confidential and proprietary. Expanding Your Training Outlook with E-Learning IRI eSuite See - Act – Win.
05/03/20101 Meet Dr. John A. White He founded a logistics consulting firm, SysteCon, Inc., and served as its chairman until its merger with Coopers & Lybrand.
What Happens In Windows 8 Stays In Windows 8 Moti Joseph & Marion Marschalek Defcamp 2014.
O n l y f r o m S y n e r g i s t i c s Establishing Knowledge Communities with KM Portals.
Intermediate 2 PE Skills & Techniques Goal Setting Monitoring.
SOMA Service-Oriented Mobile learning Architecture Fabian Kromer Andreas Kuntner
Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions.
3-5 March | DBSA | Midrand The National Environmental Skills Summit.
Jacob Flindt – Stand G6 Multichannel delivery with full analytics.
Our school is one of the oldest in Moscow which was built more than 70 years ago. Many generations have been studied there and most of our teachers are.
Conferencing & Enterprise ROI Randy Knaub Director of Marketing.
Network security Product Group 2 McAfee Network Security Platform.
The Benefits of Participation in X12. 2 X12 Participation… Accelerates the your organization’s mission/vision/strategy –All organizations that participate.
Advanced x86: BIOS and System Management Mode Internals Conclusion Xeno Kovah && Corey Kallenberg LegbaCore, LLC.
Web Hosting Providers TERRY HALL. Requirements  FREE  No advertising  FTP access (or another secure transfer method)  Near 100% uptime  Adequate.
Advanced x86: BIOS and System Management Mode Internals Introduction
Autograder Better management and evaluation of lab assignments.
Xeno Kovah && Corey Kallenberg
PRESENTATION TITLE | DATE Moving the Life Science Industry Forward.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
Secure Software Development Security Operations Chapter 9 Rasool Jalili & M.S. Dousti Dept. of Computer Engineering Fall 2010.
Advanced x86: BIOS and System Management Mode Internals SMI Suppression Xeno Kovah && Corey Kallenberg LegbaCore, LLC.
Our Place in the Cloud DCIA P2P & Cloud Market Conference March 9, 2010.
The Eugene T. Moore School of Education Working together to promote the growth, education, and social development of children and youth David E. Barrett.
READ ME FIRST Use this template to create your Partner datasheet for Azure Stack Foundation. The intent is that this document can be saved to PDF and provided.
THE PRESENT AND FUTURE nopCommerce  .
A Virtual Tour of SophosLabs Building next-generation protection
ICT22 – 2016: Technologies for Learning and Skills ICT24 – 2016: Gaming and gamification Francesca Borrelli DG CONNECT, European Commission BRUXELLES.
10 LinkedIn Tips for Your Local Business
The Rise and Fall of Open Source
CSE 5912 Course Objectives and Requirements
Organization The Jerash University is located in a modern campus in the center of the lively city of Jerash. The Jerash University (JU) was established.
Managed Security Services.
Managed Security Services
Managed Security Services.
Internal collaboration
INFS 3500 Martin, Brad, and John
Microsoft Virtual Academy
Grand Island Senior High School
Complete Exam Dumps - Pass In 24 Hours - Dumps4Download
Managed Security Services. Table Of Contents 1. Company profile 2. Managed Security Services 3.3. Features of Managed Security Services.
For more information visit: more information visit: Magento DevelopmentAgency.
Best Software Development Company | Sara Analytics Pvt. Ltd.
Dot Net ​ Overview  The.NET Framework is a development framework that provides a new programming interface to Windows services and APIs, and integrates.
Introduction to Intel x86-64 Assembly, Architecture, Applications, & Alliteration Xeno Kovah – 2014 xkovah at gmail.
Technical Capabilities
Stabilization & Sustainability: A Progress Report from CampusWorks
Dreaming up a CMS in Go (golang)
Thank you to our Sponsors
DITA Overview – Build the case for DITA
OU BATTLECARD: Oracle WebCenter Training
Presentation transcript:

Training Security Nerds: Computum deos ab hominibus Xeno Kovah

tl;dt

Intermediate x86 (2 day, Xeno Kovah) Intermediate x86 (2 day, Xeno Kovah) Advanced x86: Virtualization (2day, David Weinstein, TBD) Advanced x86: Virtualization (2day, David Weinstein, TBD) Intro x86 (2 day, Xeno Kovah) Intro x86 (2 day, Xeno Kovah) Life of Binaries (2 day, Xeno Kovah) Life of Binaries (2 day, Xeno Kovah) Rootkits (2 day, Xeno Kovah) Rootkits (2 day, Xeno Kovah) Reverse Engineering (2 day, Matt Briggs) Reverse Engineering (2 day, Matt Briggs) Malware Analysis 2 day, Matt Briggs, TBD Malware Analysis 2 day, Matt Briggs, TBD Vulnerabiliti es & Exploits 1 (2 day, Corey Kallenberg ) Vulnerabiliti es & Exploits 1 (2 day, Corey Kallenberg ) Required Recommended Delivered Future (partial) r0x0r Skill Tree Advanced x86: Real Mode (3day, John Butterworth, Fall 2012) Advanced x86: Real Mode (3day, John Butterworth, Fall 2012) Exploits 2 (2 day, Corey Kallenberg, TBD) Exploits 2 (2 day, Corey Kallenberg, TBD) Using TPMs (2 day, Ariel Segall, TBD) Using TPMs (2 day, Ariel Segall, TBD) ARM Architecture (3 day, TBD) ARM Architecture (3 day, TBD) Exploits 3 (2 day, Corey Kallenberg, TBD) Exploits 3 (2 day, Corey Kallenberg, TBD)

The great pyramid of security knowledge, as built by slaves to curiosity

OPEN SECURITY TRAINING.INFO (\Why.html) That's the "logo" Pretty awesome huh?

Why should you teach? Selfish Make mad cash Look good at or outside of work by showing what you know Look good at work by creating a training program Reinforce existing and learn new material for your own usage Improve your presentation skills Networking & Collaboration Generate (hopefully) loyal underlings

Why should you teach? Altruistic Pay forward what you've learned from others Lower the cost of training for everyone Reduce the inefficiency of n00b bootstrapping Consistency of shared baseline knowledge on project/at company. Get more deep technical peers faster Push your field forward faster

Why should you contribute? Selfish Show that your material is vastly superior to others’ Increase your reputation Platform to advertise that you are willing to offer private training for organizations which don’t have people who can pick up the material for internal training (works good for niches.)

Why should you contribute? Altruistic Reduce duplication of effort You've got "abandonware" class material that you would like to give a second life Save people time when generating new classes Set a new, higher, baseline for expectations of knowledge Build better organized ordered progressions to get bootstrap deep skills faster

Questions? (If you see just a blank page, it means you're using a broken version of IE. Shame on you.)

Bonus Content! CHEAT CODE ENABLED!

r0x0r Arcade Some learning requires grinding! But it can still be accelerated! Such timeless classics as: BinDeciHex The *other* ESP game 1 step forward 3 steps back Whack-a-ssembly/Assembly Munchers May your buffer overfloweth At the demos there's time for!

Thanks