1 / 15

Training Security Nerds: Computum deos ab hominibus

Training Security Nerds: Computum deos ab hominibus. Xeno Kovah. tl;dt. Required. (partial) r0x0r Skill Tree. Recommended. Delivered. Future. Malware Analysis 2 day, Matt Briggs, TBD. Exploits 3 (2 day, Corey Kallenberg , TBD). Advanced x86: Real Mode

leelscott
Download Presentation

Training Security Nerds: Computum deos ab hominibus

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Training Security Nerds:Computumdeosabhominibus Xeno Kovah

  2. tl;dt

  3. Required (partial) r0x0r Skill Tree Recommended Delivered Future Malware Analysis 2 day, Matt Briggs, TBD Exploits 3 (2 day, Corey Kallenberg, TBD) Advanced x86: Real Mode (3day, John Butterworth, Fall 2012) Reverse Engineering (2 day, Matt Briggs) Rootkits (2 day, XenoKovah) Advanced x86: Virtualization (2day, David Weinstein, TBD) Exploits 2 (2 day, Corey Kallenberg, TBD) Vulnerabilities & Exploits 1 (2 day, Corey Kallenberg ) Intermediate x86 (2 day, XenoKovah) Life of Binaries (2 day, XenoKovah) ARM Architecture (3 day, TBD) Intro x86 (2 day, XenoKovah) Using TPMs (2 day, Ariel Segall, TBD)

  4. The great pyramid of security knowledge, as built by slaves to curiosity

  5. The great pyramid of security knowledge, as built by slaves to curiosity

  6. The great pyramid of security knowledge, as built by slaves to curiosity

  7. OPEN SECURITY TRAINING .INFO (\Why.html) That's the "logo" Pretty awesome huh?

  8. Why should you teach?Selfish • Make mad cash • Look good at or outside of work by showing what you know • Look good at work by creating a training program • Reinforce existing and learn new material for your own usage • Improve your presentation skills • Networking & Collaboration • Generate (hopefully) loyal underlings

  9. Why should you teach?Altruistic • Pay forward what you've learned from others • Lower the cost of training for everyone • Reduce the inefficiency of n00b bootstrapping • Consistency of shared baseline knowledge on project/at company. • Get more deep technical peers faster • Push your field forward faster

  10. Why should you contribute?Selfish • Show that your material is vastly superior to others’ • Increase your reputation • Platform to advertise that you are willing to offer private training for organizations which don’t have people who can pick up the material for internal training (works good for niches.)

  11. Why should you contribute?Altruistic • Reduce duplication of effort • You've got "abandonware" class material that you would like to give a second life • Save people time when generating new classes • Set a new, higher, baseline for expectations of knowledge • Build better organized ordered progressions to get bootstrap deep skills faster

  12. Questions? • www.OpenSecurityTraining.info • (If you see just a blank page, it means you're using a broken version of IE. Shame on you.)

  13. Bonus Content! CHEAT CODE ENABLED!

  14. r0x0r Arcade • Some learning requires grinding! • But it can still be accelerated! • http://code.google.com/p/roxor-arcade • Such timeless classics as: • BinDeciHex • The *other* ESP game • 1 step forward 3 steps back • Whack-a-ssembly/Assembly Munchers • May your buffer overfloweth • At the demos there's time for!

  15. Thanks

More Related