This will be CircleCityCon's 5th Annual Information Security Conference. As always we will be serving up rich content in our talk tracks, hosting various contests with our CTF and other thematic puzzles throughout the conference, and as always offering our hallmark free trainings. We have some big plans for this conference that are still under construction, but rest assured you won't want to miss this one! Premium Trainings May 31st – June 1st 2018 Intro To Threat Intelligence Abstract: Defining Threat Intelligence (TI) in an understandable way can be frustrating. Every cybersecurity vendor and expert seems to have their own definition of what it entails, not to mention just as numerous procedural viewpoints to go along with it. One method to keep the concept of TI clear is to describe its actions with verbs, such as “collect”,“detect”, “investigate”,“analyze”, “alert”, and “report”. If you use those key words as pivots, it is easy to enumerate the functions of TI. This course contains 12 labs to intensify a student’s introduction to TI. The course begins with a discussion of key concepts and principles and then builds to convey an understanding ofhow it fits in your company and when, where, and how to use it. The labs assist those aspiring to understand TI lockdown when and where it plays a role and how Instructor: Monty St John : https://cyberdefenses.com/ : Twitter: @MontyStJohn Monty St John has been in the security world for more than two decades. When he is not responding to incidents he teaches classes in Threat Intelligence, Incident Response and Digital Forensics. Monty is a frequent contributor to community and industry events, presenting at BSides D.C., BSides Austin, Charm, Derbycon and several others. He lives in Austin, Texas and is a security trainer for CyberDefenses, Inc. based out of Round Rock, Texas. Intro To Malware Analysis Abstract: Due to the prevalence and business impact of malware, security professionals increasingly need the skills necessary to analyze malware. This two day course teaches attendees the proven concepts, techniques and processes for examining malicious code. Students will take multiple "from-the-wild" malware samples in a hands-on environment and learn how to analyze their characteristics and behavior to determine what they do and what risk they present. No previous malware analysis experience is necessary as this course is designed for those who have never performed malware analysis before. Students will be required to bring their own laptops for the class. Laptops will need a VMWare Workstation or VirtualBox installation with an install of Windows (7 or higher) as the guest OS prior to the class. Note that VMWare Player will NOT work as it does not have the ability to take snapshots. A Linux VM and tools will be provided on a USB drive. Instructor: Tyler Hudak : Twitter: @SecShoggoth Tyler Hudak has more than 15 years of extensive real-world experience in incident handling, malware analysis, computer forensics, and information security for multiple Fortune 500 firms. Tyler has spoken and taught at a number of security conferences on the topics of malware analysis, incident response and penetration testing, and brings his front line experience and proven techniques to bear in the training. He currently works for a major medical institution as the team lead for the security operations center. Cryptography and Cryptocurrencies Abstract: Learn cryptography with a series of hands-on projects in a fun, CTF-style environment. Covers the main cryptosystems in use today: AES, RSA, ECC, SHA, bitcoin, and Ethereum. The first challenges are easy enough for beginners (Binary, XOR, Cryptokitties), and the later ones get difficult enough to interest intermediate security professionals (Padding Oracle, Smart Contracts). My assistants and I will demonstrate the challenges and help participants get through them as needed. Technical requirements: some challenges require only a Web browser, but to do them all you will need a computer that can host virtual machines. Some projects require Windows, and some require 64-bit Ubuntu Linux. Thumbdrives with appropriate virtual machines will be available. All materials and challenges are freely available at samsclass.info, including slide decks, video lectures, and hands-on project instructions. They will remain available after the workshop ends. Students are required to bring Students will need to bring a computer that can run a VMware or Virtualbox virtual machine. Instructor: Sam Bowne : https://samsclass.info : Twitter: @sambowne Sam Bowne has been teaching computer networking and security classes at CCSF since 2000. He has given talks and hands-on trainings at DEFCON, HOPE, B-Sides SF, B-Sides LV, BayThreat, LayerOne, Toorcon, and many other schools and conferences. He has a B.S. in Physics from Edinboro University of Pennsylvania and a Ph.D. in Physics from University of Illinois, Urbana-Champaign.
starting on 2018-06-01 12:00:00
Address:
241 West Washington Street
46204 Indianapolis
United States
A fantastic parody of by Jason Grlicky
By donpdonp on 2012-06-20 15:56:55