TakeDownCon Hacking Conference Las Vegas 2012

For All Things IT Security Conference Related

Join Our Newsletter [Over 50K Subscribers]

Let us send you information on ticket discounts, speaking opportunities and a ton more!

Home / Blog / TakeDownCon Hacking Conference Las Vegas 2012

TakeDownCon Hacking Conference Las Vegas 2012

Tagged Under:

TakeDownCon Hacking Conference And Training event is taking place next week, December 1st – 6th in Sunny Las Vegas!

TakeDown is an Information Security conference that is essentially split into penetration testing and forensics training, and then the main conference itself.

The security training this year includes the following designations:

Certified Security Analyst – ECSA-LPT
Computer Hacking Forensic Investigator – CHFI
CAST 611 – Advanced Penetration Testing
CAST 612 – Advanced Mobile Hacking & Forensics
CAST 613 – Advanced Application Security
CAST 614 – Advanced Network Defense
CAST 615 – Cryptography Deep Dive
Wireless & Bluetooth Hacking 101
Certified Ethical Hacker – CEHv7
Teaching Penetration Testing

An outline of some of the speakers:

Georgia Weidman
Georgia Weidman is a highly experienced penetration tester and security researcher. In fact we had Georgia on the show talking about Introducing the Smartphone Penetration Testing Framework which was really interesting and shows just how much can be achieved with mobile penetration. Georgia in an expert with secure software engineering, and information security as well. She is Certified Ethical Hacker (CEH) certified and is a Certified Information Systems Security Professional (CISSP) and Offensive Security Certified Professional (OSCP). Georgia talk at TakeDown is “Bypassing the Android Permission Model”.

Francis Brown: Pulp Google Hacking – The Next Generation Search Engine Hacking Arsenal
Rob Kraus: 404 Basic Security Not Found
Nicolas Brulez: Your Master Boot Record held hostage
Wayne Burke: RF in Security and Hacking with Android and Apple Devices
Dave Chronister: This Cloud is a Smoke-Screen
Paul Coggin: Own the Network – Own the Data
Chuck Easttom: Public Key Cryptography Indepth
Rafal Los: House of cards – Preparing the unprepared enterprise
Dave Marcus: Why Defensive InfoSec Fails
Gary Miliefsky: Best Practices for BulletProof Network Security
Ben Miller: Trojans What You Don’t Know Can Hurt You
Douglas Morato: The Cloud Whisperer: What Security Secrets is your Cloud not disclosing?
Teague Newman: SCADA/PLC Exploits and Their Legal Considerations
Tim Pierson: The Cloud Whisperer: What Security Secrets is your Cloud not disclosing?
Josh Shaul: Hacking Databases: Exploiting The Top Database Vulnerabilities And Misconfiguration
Sagi Srikar: Dual Channel Authentication
Tiffany Rad: SCADA/PLC Exploits and Their Legal Considerations

An outline of some of the information security training courses:

Certified Ethical Hacker (CEH) v7 (4 days).
The CEH Program is widely known as the course that certifies individuals in the specific network security discipline of Ethical Hacking. This is a vendor-neutral course and is internationally recognized. The Certified Ethical Hacker certification will strengthen application knowledge of security professionals and indeed anyone who is interested in security.

Certified Security Analyst / Licensed Penetration Tester (ECSA/LPT) (4 days).
The ECSA stands for “EC Council Certified Security Analyst”. As an ECSA professional, the penetration tester will acquire an advanced ethical hacking training certification that is generally a qualification that follows on from Certified Ethical Hacker, CEH.

Computer Hacking Forensics Investigator (CHFI) (4 days).
This course outlines a detailed approach to computer forensics and evidence analysis. Also offered by EC Council, the training and qualification will detail the processes involved with forensic investigation.

Advanced Penetration Testing (CAST 611) (3 days).
This three day course offered at TakeDown is designed to teach the student to focus on intrusion detection, attacking and defending highly secured environments. Operating systems that are targeted are the usual suspects: Windows Vista, Windows 7, Windows Server 2008, and the latest Linux servers.

Advanced Mobile Hacking & Forensics (CAST 612) (3 days).
Elevating Mobile Forensics & Investigation To An Art Form
This course looks at, in depth, the practical and theoretical aspects of mobile hacking, forensics and software hardening with the majority of the course involved in labs.

Other courses include:

Advanced Application Security (CAST 613)
Advanced Network Defense (CAST 614)
Cryptography Deep Dive (CAST 615)
Wireless & Bluetooth Hacking 101

Did you attend? Let us know how it was in the comments below.

Leave a comment or reply below...thanks!