February 12, 2026

Capitalizations Index – B ∞/21M

CircleCityCon 5.0 2018

Circlecitycon 5. 0 2018

CircleCityCon 5.0 2018
This will be CircleCityCon's 5th Annual Information Security Conference.  As always we will be serving up rich content in our talk tracks, hosting various contests with our CTF and other thematic puzzles throughout the conference, and as always offering our hallmark free trainings. We have some big plans for this conference that are still under construction, but rest assured you won't want to miss this one! Premium Trainings May 31st – June 1st 2018 Intro To Threat Intelligence Abstract: Defining Threat Intelligence (TI) in an understandable way can be frustrating. Every cybersecurity vendor and expert seems to have their own definition of what it entails, not to mention just as numerous procedural viewpoints to go along with it. One method to keep the concept of TI clear is to describe its actions with verbs, such as “collect”,“detect”, “investigate”,“analyze”, “alert”, and “report”. If you use those key words as pivots, it is easy to enumerate the functions of TI. This course contains 12 labs to intensify a student’s introduction to TI. The course begins with a discussion of key concepts and principles and then builds to convey an understanding ofhow it fits in your company and when, where, and how to use it. The labs assist those aspiring to understand TI lockdown when and where it plays a role and how Instructor: Monty St John : https://cyberdefenses.com/ : Twitter: @MontyStJohn Monty St John has been in the security world for more than two decades. When he is not responding to incidents he teaches classes in Threat Intelligence, Incident Response and Digital Forensics. Monty is a frequent contributor to community and industry events, presenting at BSides D.C., BSides Austin, Charm, Derbycon and several others. He lives in Austin, Texas and is a security trainer for CyberDefenses, Inc. based out of Round Rock, Texas. Intro To Malware Analysis Abstract: Due to the prevalence and business impact of malware, security professionals increasingly need the skills necessary to analyze malware. This two day course teaches attendees the proven concepts, techniques and processes for examining malicious code. Students will take multiple "from-the-wild" malware samples in a hands-on environment and learn how to analyze their characteristics and behavior to determine what they do and what risk they present. No previous malware analysis experience is necessary as this course is designed for those who have never performed malware analysis before. Students will be required to bring their own laptops for the class.  Laptops will need a VMWare Workstation or VirtualBox installation with an install of Windows (7 or higher) as the guest OS prior to the class. Note that VMWare Player will NOT work as it does not have the ability to take snapshots. A Linux VM and tools will be provided on a USB drive. Instructor: Tyler Hudak : Twitter: @SecShoggoth Tyler Hudak has more than 15 years of extensive real-world experience in incident handling, malware analysis, computer forensics, and information security for multiple Fortune 500 firms. Tyler has spoken and taught at a number of security conferences on the topics of malware analysis, incident response and penetration testing, and brings his front line experience and proven techniques to bear in the training. He currently works for a major medical institution as the team lead for the security operations center. Cryptography and Cryptocurrencies Abstract: Learn cryptography with a series of hands-on projects in a fun, CTF-style environment. Covers the main cryptosystems in use today: AES, RSA, ECC, SHA, bitcoin, and Ethereum. The first challenges are easy enough for beginners (Binary, XOR, Cryptokitties), and the later ones get difficult enough to interest intermediate security professionals (Padding Oracle, Smart Contracts). My assistants and I will demonstrate the challenges and help participants get through them as needed. Technical requirements: some challenges require only a Web browser, but to do them all you will need a computer that can host virtual machines. Some projects require Windows, and some require 64-bit Ubuntu Linux. Thumbdrives with appropriate virtual machines will be available. All materials and challenges are freely available at samsclass.info, including slide decks, video lectures, and hands-on project instructions. They will remain available after the workshop ends. Students are required to bring Students will need to bring a computer that can run a VMware or Virtualbox virtual machine.  Instructor: Sam Bowne : https://samsclass.info : Twitter: @sambowne  Sam Bowne has been teaching computer networking and security classes at CCSF since 2000. He has given talks and hands-on trainings at DEFCON, HOPE, B-Sides SF, B-Sides LV, BayThreat, LayerOne, Toorcon, and many other schools and conferences. He has a B.S. in Physics from Edinboro University of Pennsylvania and a Ph.D. in Physics from University of Illinois, Urbana-Champaign.
starting on 2018-06-01 12:00:00

Address:
Westin Indianapolis
241 West Washington Street
46204 Indianapolis
United Statesdonpdonp – talking ’bout bitcoin
A fantastic parody of cbsksfm.files.wordpress.com/2010/09/don-p.jpg by Jason Grlicky
By donpdonp on 2012-06-20 15:56:55
Tags

Previous Article

$3 Rimbit (RBT) Climbing Cryptocurrency Potential

Next Article

TIME

You might be interested in …

Fun coin i̇ncelemesi ; fun coin nedir?

Fun Coin İncelemesi ; Fun Coin Nedir ?

Fun Coin İncelemesi ; Fun Coin Nedir ? Altcoin almak için ; https://www.binance.com/?ref=15392625 https://www.kucoin.com/#/?r=23dQd Bu bölümde Fun Coin’i inceliyoruz. Fun coin nedir? Kullanım alanları neler? Gelecek vaadediyor mu? Hepsinin cevabını videomuzda bulabilirsiniz. Güncel videolardan haberdar […]

Social investment platform etoro launches in 30 us states

Social Investment Platform Etoro Launches in 30 US States

Social Investment Platform Etoro Launches in 30 US States Social investment and trading platform Etoro has announced the launch of its platform and cryptocurrency wallet in 30 U.S. states and two territories. In America, users […]