{"id":4846,"date":"2015-11-24T18:21:27","date_gmt":"2015-11-24T18:21:27","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=4846"},"modified":"2018-09-18T09:21:42","modified_gmt":"2018-09-18T13:21:42","slug":"sas2016-training","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/sas2016-training\/4846\/","title":{"rendered":"Kaspersky Security Analyst Summit: a few words about training"},"content":{"rendered":"<p>Kaspersky Security Analyst Summit is planned for next February. Among the highlights of SAS 2016 are\u00a0training sessions for the attending participants, with top Kaspersky Lab\u2019s researchers and other security experts at the helm.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/hV3JEI0oruo?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p><strong>Hunt APTs with Yara like a GReAT Ninja<\/strong><\/p>\n<p>This training will be led by the top brass of Global Research &amp; Analysis Team with Kaspersky Lab \u2013 Costin Raiu, Vitaly Kamluk and Sergey Mineev.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Kaspersky Security Analyst Summit: a few words about training #TheSAS2016<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FTqC1&amp;text=Kaspersky+Security+Analyst+Summit%3A+a+few+words+about+training+%23TheSAS2016\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>If anyone knows a thing or two about <a href=\"http:\/\/apt.securelist.com\" target=\"_blank\" rel=\"noopener\">APTs<\/a>, it is these gentlemen. Kaspersky Lab\u2019s Global Research and Analysis Team is credited with the discovery and analysis of several major cyberespionage campaigns, including Stuxnet, Duqu, Flame, Gauss, Red October, MiniDuke, Turla and more recently, the Careto\/TheMask, <a href=\"https:\/\/business.kaspersky.com\/the-equation-carbanak-desert-falcons-security-analyst-summit-summary\/3637\/\" target=\"_blank\" rel=\"noopener nofollow\">Carbanak<\/a> and Duqu2.<\/p>\n<p>In fact, there are hundreds of APTs discovered and analyzed by GReAT, and during the training they are willing to share one of their specific recipes \u2013 \u201ca secret ingredient\u201d, which happens to be Yara rules for detection of APT-related malware. Lots of real-life examples are promised, which really helped to discover the actual threats.<\/p>\n<p>The class will take two days and is limited to 15 participants max. The only requirements are your own laptop with Yara v. 3.4.0 installed \u2013 and, of course, knowledge of the Yara language.<\/p>\n<p><strong>Malware Reverse Engineering course<\/strong><\/p>\n<p>Over the four days the participants will be unpacking malware, extracting shell codes, and reverse engineering the malware (there will be a few real-world APT samples).<\/p>\n<p>The class is limited to 20 participants; the list of prerequisites is rather long, but it is worth it.<\/p>\n<p><strong>Security of cellular communications in embedded systems<\/strong><\/p>\n<p>As the Internet of Things is upon us, a multitude of connected embedded devices arrive with lots of possible flaws \u2013 flaws that are as exploitable as any other software bug, but such exploitation may stay unseen for a very long time.<\/p>\n<p>During this training, Alexey Osipov, Senior Expert with Kaspersky Lab\u2019s Penetration Testing Team, will offer his insights into possible security issues in cellular communications used in automotive vehicles and equipment that needs on-demand communications in remote sites.<\/p>\n<p>Participants will learn various methods of gaining access to cellular-connected devices, overall approach to security assessment and vulnerability identification in such systems. Acquired knowledge will help participants to conduct their own security assessments of GSM-based communication infrastructure for such targets as SCADA RTU\/PLC, transportations systems, automotive vehicles, ATMs and various IoT devices.<\/p>\n<p>The training is targeting telecom specialists, security engineers, penetration testers, and vulnerability researchers.<\/p>\n<p><strong>Software Exploitation Via Hardware Exploitation<\/strong><\/p>\n<p>Stephen Ridley is a Principal Researcher with Xipiter, with more than 10 years of experience in software development, software security, and reverse engineering.<\/p>\n<p>His course is also dealing with IoT and its flaws:\u00a0over the two days, participants will learn how to reverse engineer and exploit software on embedded systems \u2013 via hardware.<\/p>\n<p>It teaches all of this against real-world Commercial Off The Shelf (COTS) products such as routers, game systems, and other appliances.<\/p>\n<p>This course has the widest intended audience: penetration testers, forensic investigators, reverse engineers, software security auditors\/analysts, software exploitation engineers, \u201cmakers\u201d, tinkerers, developers, IT pros, mobile developers, hackers, jailbreakers, and anyone interested.<\/p>\n<p>All the participants will need a laptop with a few operational USB ports, a 3-button mouse, and a VMWare workstation installed.<\/p>\n<p><strong>WINDOWS Kernel Rootkits Techniques and Analysis<\/strong><\/p>\n<p>As the most popular OS in the world, Windows is also the most targeted OS. Introducing a kernel rootkit is a dream-come-true for cybercriminals, and the source of the most tremendous headache for security pros.<\/p>\n<p>This class is tailored for malware analysts, system developers, forensic analysts, incident responders, or enthusiasts who want to analyze Windows kernel rootkits or develop software for similar tasks. It explains how the rootkits exploit Windows architecture, hiding processes, files, network connections, etc. The participants will delve into the kernel programming environment, implementing some kernel-mode utilities to aid understanding.<\/p>\n<p>The class will contain, of course, many hands-on labs and exercises using real-world rootkits. There are no made-up examples in the class.<\/p>\n<p>A laptop with VMWare and a number of other specific software will be required to participate.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>The training\u2019s goal is to improve IT people skills against non-standard #threats #protectmybiz #TheSAS2016<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FTqC1&amp;text=The+training%26%238217%3Bs+goal+is+to+improve+IT+people+skills+against+non-standard+%23threats+%23protectmybiz+%23TheSAS2016\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>Digital Intelligence Gathering Using Maltego<\/strong><\/p>\n<p>This course is built around capabilities of special intelligence-gathering software Maltego, developed by Paterva company. Appropriately, Paterva\u2019s engineers will be the trainers here. Their motto reads:\u201d \u201cJoin us and we\u2019ll show you how to navigate and map the Internet\u2019s darkest rivers\u2026\u201d<\/p>\n<p>Trainers promise to \u201cshock out\u201d the audience, showing how much data is \u201cout there\u201d and what people can do with it as well as how you can reach this data for both defending and attacking.<\/p>\n<p>Attacked businesses often ask security researchers to help them to find out \u201cwhodunnit\u201d, although in the most cases it is not their job. This training may help in-house IT staff to perform the \u201cintelligence\u201d task, if it necessary.<\/p>\n<p>In fact, all of these training sessions can help businesses\u2019 in-house IT professionals to perform tasks that are non-standard, but occasionally may become critical to protect the company\u2019s data from advanced threats.<\/p>\n<p>More details on SAS 2016 is available <a href=\"https:\/\/sas.kaspersky.com\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Security Analyst Summit is planned for next February. Among the highlights of SAS 2016 are trainings for the attending participants, with top Kaspersky Lab&#8217;s researchers and other security experts at the helm. <\/p>\n","protected":false},"author":209,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[1410],"class_list":{"0":"post-4846","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-business","7":"category-smb","8":"tag-sas-2016"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/sas2016-training\/4846\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/sas2016-training\/4846\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/sas2016-training\/4846\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/sas-2016\/","name":"SAS 2016"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4846"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4846\/revisions"}],"predecessor-version":[{"id":23887,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4846\/revisions\/23887"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}