• A
  • Android Forensics and Security Testing

    Shawn Valle
    Sat, 12:00 - 13:50
    Congressional D - Train the Trainer
  • E
  • Exploits 2: Exploitation in the Windows Environment

    Corey Kallenberg
    Sat, 18:30 - 19:50
    Congressional D - Train the Trainer
  • I
  • Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration

    Xeno Kovah
    Sat, 11:30 - 12:50
    Congressional C - Train the Trainer
  • Introduction to Software Exploits

    Corey Kallenberg
    Sat, 17:00 - 18:20
    Congressional D - Train the Trainer
  • Introduction to Software Reverse Engineering

    Frank Poz
    Sat, 18:00 - 18:50
    Congressional C - Train the Trainer
  • Introduction to Trusted Computing

    Ariel Segall
    Sat, 15:00 - 16:50
    Congressional D - Train the Trainer
  • Introduction to Vulnerability Assessment

    Nate Adams, Jose Cintron, Chriss Koch
    Sat, 10:00 - 11:50
    Congressional D - Train the Trainer
  • Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration

    Xeno Kovah
    Sat, 10:00 - 11:20
    Congressional C - Train the Trainer
  • R
  • Reverse Engineering Malware

    Frank Poz
    Sat, 19:00 - 19:50
    Congressional C - Train the Trainer
  • Rootkits: What They Are, and How to Find Them

    Xeno Kovah
    Sat, 16:30 - 17:50
    Congressional C - Train the Trainer
  • T
  • The Life of Binaries

    Xeno Kovah
    Sat, 15:00 - 16:20
    Congressional C - Train the Trainer