Print Page   |   Contact Us   |   Sign In
Community Search
Calendar

11/13/2017 » 11/16/2017
2017 ACE Gov Registration

Thank you to our 2017 Diamond and Platinum Sponsors!

2017 Training Descriptions
Share |

AWS Immersion Day

Date: Tuesday & Wednesday, December 6 & 7, 2016
Time: 800 - 1700
Course Type: Technical - 8 hour course
Location: San Miguel Room A
Presented by: Amazon Web Services

AWS Technical Essentials introduces you to AWS products, services, and common solutions. It provides IT technical end users with basic fundamentals to become more proficient in identifying AWS services so that you can make informed decisions about IT solutions based on your business requirements.

Day 1

0800-0815 - Welcome & Introductions

0815-0900 - Introduction to Cloud & AWS

0900-0915 - Break

0915-1115 - Module 1: AWS Overview (Foundational Services Review)

1115-1215 – Lunch

1215-1330 - Module 2: Security Concepts; Compute Services & Networking

1330-1345 – Break

1345-1530 - Module 3: Virtual Private Cloud Deep Dive & Example

                (Configuring a DoD-compliant Environment) DEV-SEC-OPS in the Cloud 

Day 2

 0800-0815 - Welcome & Introductions

 0815-0900 - Introduction to Cloud & AWS

0900-0915 - Break

0915-1115 - Module 1: AWS Overview (Foundational Services Review)

 115-1215 – Lunch

1215-1330 - Module 2: Security Concepts; Compute Services & Networking

1330-1345 – Break

1345-1415 –Module 3:  Overview of Virtual Private Cloud and Architecture Examples – Building a DoD Compliant Infrastructure in the Cloud

1415-1530 - Module 4:Exploring Enterprise Data Analytics & AWS Managed Data services

Basic Android Reverse Engineering

Date: Tuesday & Wednesday, December 6 & 7, 2016
Time: 1400 - 1500
Course Type: Technical - 1 hour course
Location: San Cristobal Room
Presented by: Silotech

Learn the basics of reverse engineering android applications. You will learn the anatomy of an Android application, how to obtain target applications, and how to reverse the target application.

Basic Malware Analysis

Date: Tuesday & Wednesday, December 6 & 7, 2016
Time: 800 - 1000
Course Type: Technical - 2 hour course
Location:  San Augustine Room A
Presented by: Silotech

Learn the fundamentals necessary to analyze malicious software using behavioral analysis and basic static analysis in a virtualized sandboxed environment.

Civil Air Patrol Briefing

Date: Tuesday - Thursday, December 6 - 8, 2016
Time: 1400 - 1500
Course Type: Technical - 1 hour course
Location: San Miguel Room B
Presented by: CAP

Funded by Alamo AFCEA, Civil Air Patrol’s “Cyber Defense Training Academy” or CDTA is designed to prepare the next generation cyber warriors. Developed by a former USAF cyber operator, the program focuses on computer security, information assurance, teamwork, and leadership. This session will provide attendees with CDTA’s 3-year report and our way ahead for 2017 and beyond. Civil Air Patrol is the United States Air Force Auxiliary with three core missions: Cadet Programs, Aerospace Education, and Emergency Services. For more information visit: gocivilairpatrol.com.

 

CyberSecurity First Responder: Threat Detection/Response

Date: Tuesday - Thursday, December 6 - 8, 2016
Time: 800 - 1700
Course Type: Technical - 3 day course
Location:  San Miguel Room B
Presented by: New Horizon

Please note: There is a $500 fee required for this course

  • Lesson 1: Assessing Information Security Risk
  • Lesson 2: Creating an Information Assurance Lifecycle Process
  • Lesson 3: Analyzing Threats to Computing and Network Environments
  • Lesson 4: Designing Secure Computing and Network Environments
  • Lesson 5: Operating Secure Computing an Network Environments
  • Lesson 6: Assessing the Security Posture Within a Risk Management Framework

Department of Defense Security Controls

Date: Tuesday, December 7, 2016
Time: 1300 - 1700

Date: Wednesday, December 7, 2016
Time: 800 - 1200

Course Type: PDU - 4 hour course
Location: San Gabriel Room B
Presented by: KRATOS SecureInfo

Understanding how to Implement DoD Security Controls

With the advent of Continuously Monitoring security controls, no longer are the days of it just being a paperwork drill. Kratos SecureInfo will discuss a few lessons learned on mapping security controls, identifying test artifacts, integrating the DISA CCI’s and remapping POA&M entries all leading toward a continuous monitored risk management framework for security.

 

Fundamentals of Reverse Engineering in IDA Pro

Date: Tuesday & Wednesday, December 6 & 7, 2016
Time: 800 - 1200
Course Type: Technical - 2 hour course
Location: San Augustine Room A
Presented by: Silotech

Learn to navigate the IDA Pro GUI and begin advanced static analysis of binaries. You will learn how to identify and label common data structures in IDA Pro.

Advanced Authentication Techniques:
Identity Management and Access Control

Date: Tuesday, December 6, 2016
Time: 1000 - 1200

Date: Wednesday, December 7, 2016
Time: 1000- 1200

Course Type: Tech - 2 hour course
Location: 
Presented by:

Identity Management and Access Control have become more complex in today’s world with shifting perimeters and a wide range of authentication measures and protocols from which to choose.  This session will focus on current authentication protocols, what they are and how they work, and how they can be used to secure your environments by providing a comprehensive federated identity solution thru authentication, authorization and single sign-on. In this engagement, we will show how to differentiate access to your applications, data, network and cloud based on user identity and context.

 

Introduction to DoD Risk Management Framework

Date: Tuesday, December 6, 2016
Time: 800 - 1200

Date: Wednesday, December 7, 2016
Time: 1300 - 1700

Course Type: PDU - 4 hour course
Location: San Gabriel Room B
Presented by: KRATOS SecureInfo

Are you ready to transition from DIACAP to the new DoD Risk Management Framework?

Transitioning your DIACAP package to RMF within eMASS is not a one-to-one conversion. There are a number of deltas that a practitioner needs to be aware of before they start their conversion.  Kratos SecureInfo will provide attendees a “peel back the onion” look at some of the pitfalls system owners will encounter and offer recommendations that will save you time, patience, and a whole lot of sanity. Priceless!

 

IPSEC - Forensics Challenge

Date: Tuesday, December 6, 2016
Time: 1300 - 1400

Course Type: Tech - 1 hour course
Location: San Augustine Room A
Presented by: IPSEC

 

ITOA - IT Operations Analytics

Date: Wednesday, December 7, 2016
Time: 1030 - 1200

Course Type: Tech course
Location: San Augustine Room B
Presented by: ExtraHop

ITOA - The IT Operations Analytics approach | Continuous monitoring for Risk Management FrameWork and the approach to wire data for the network boundary

This class reaches the benefits of designing an Open IT Operations Analytics (ITOA) architecture based on the principle of streaming vastly different IT data sets into a scalable, non-proprietary data store for exploration and multi-dimensional analysis. Many IT organizations do not realize how they can use rich data sets that they already have for better operational and business decisions. The objective of Open ITOA is to enable the discovery of new valuable relationships and insights derived from these combined data sets. This will drive improved IT operations, add business value, prevent vendor or data lock-in to proprietary systems, and provide a roadmap for the cost-effective expansion of the analytics architecture.

PMI Certifications and the Project Management Professional

Date: Tuesday & Wednesday, December 6 & 7, 2016
Time: 800 - 900
Course Type: PDU - 1 hour course
Location: San Cristobal Room
Presented by: PMI

Who is PMI? What is PMI? How is the organization structured and where do you fit in? This session will provide an overview of PMI suite of credentials. It will include a brief overview of the basic requirements of the credentials with discussions on how PMI’s credentials are developed and maintained.

 

Preparing US Military for Project Management Careers

Date: Tuesday & Wednesday, December 6 & 7, 2016
Time: 900 - 1000
Course Type: PDU - 1 hour course
Location: San Cristobal Room
Presented by: PMI

Military service members are a natural fit for project management, as the characteristics are well aligned. This session will provide insight into the markets that PMI serves, resources and certifications we offer and discuss the value proposition for military members transitioning to project management careers.

 

Reverse Engineering Objects in IDA Pro

Date: Tuesday & Wednesday, December 6 & 7, 2016
Time: 1300 - 1700
Course Type: Technical - 4 hour course
Location: San Augustine Room A
Presented by: Silotech

Learn the basics of reverse engineering android applications. You will learn the anatomy of an Android application, how to obtain target applications, and how to reverse the target application.

ROOT 9B - Analyzing the Threat

Date: Monday - Wednesday, December 5 - 7, 2016
Time: 800 - 1700
Course Type: AF TNG - 3 day course
Location: San Xavier Room

This course applies the Intelligence Analysis process to the full-spectrum cycle of proactive network defense. When properly employed, this process fosters an environment of preemptive action and provides network defenders and operators with the timely and relevant intelligence required to act.

Students will learn how to apply intelligence-informed operational methodologies, including proactive cyber analysis, to accurately identify risks from specific threats. This is delivered through method-driven instruction on Intelligence Analysis techniques taught by experienced Intelligence Community (IC) professionals. The instructors will teach the intelligence-driven operations cycle – data gathering, exploitation, analysis and dissemination – to inform the student’s methods of assessing and prioritizing risk.


Student Requirements: 

  1. Students must bring a laptop with wifi support for document viewing and open-source research.

ROOT 9B - Communications Squadron of the Future

Date: Monday, December 5 - 7, 2016
Time: 800 - 1700
Course Type: AF TNG - 3 day course
Location: San Jose Room

This lecture-based training session will focus on the development of a new line of defensive cyber operators who are positioned to identify indicators of compromise that can lead to collaboration with operational adversary hunting units, forensic investigations, and a more enhanced defensive posturing. Our instructors will discuss understanding how to “operate like the adversary” and defensive postures to elude some of the world’s most sophisticated and tailored attacks. Our instructors discuss and demonstrate innovative solutions and techniques most conducive to the attack at hand and discovering and targeting timely, actionable information that could contribute to Cyberspace operations.

ROOT 9B - Hunting a Cyber Adversary

Date: Tuesday, December 6, 2016
Time: 800 - 1700
Course Type: AF TNG - 8 hour course
Location: San Gabriel Room A

This 8-hour class introduces students to memory-resident malware attacks, analysis, and defensive techniques. Students will learn how the most advanced adversaries discover vulnerabilities and create memory-resident malware invisible to almost all defenses. Students will also gain understanding of how the Windows operating system manages memory and active defense techniques to detect and eradicate memory resident malware.


Student Requirements:

  1. Students must bring a laptop with a 64-bit operating system, wifi support, and hardware virtualization supported and enabled (you may need to enable this in the BIOS). Note: I do not recommend using government-owned or employer-owned equipment for this malware class in general, especially if you are unable to turn off the antivirus software.
  2. VirtualBox installed: https://www.virtualbox.org/wiki/Downloads (note: VMWare workstation will also work)
  3. Download and set up a Kali Linux Virtual Machine as one VM (http://www.offensive-security.com/kali-linux-vmware-arm-image-download/)
  4. Download the 64-bit USGCB Win7 VHD as a second VM, create a virtual machine using it as a hard disk, and make sure they can boot it and log in: http://usgcb.nist.gov/usgcb/microsoft/download_vhd.html Attach the VHD to the IDE controller instead of the default SATA controller when setting up the VM, or you will get a blue screen. To do that, after creating the VM, click on it in VirtualBox, then click the Settings gear button, then click Storage, then remove any hard drives from the SATA controller and add the “USGCB Windows7 SP1 x64 Enterprise – 20111014.vhd” hard drive to the IDE controller. Then start the VM.
  5. Download the Debugging Tools for Windows (windbg) and install it on the Windows 7 VM: https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx

St Mary's - Education Presentation

Date: Wednesday, December 7, 2016
Time: 1000 - 1130
Course Type: Tech - 1.5 hour course
Location: San Augustine Room B

 

Secure Socket Layer Deep Dive

Date: Wednesday, December 7, 2016
Time: 800 - 1700
Course Type: Technical - 8 hour course
Location: San Augustine Room B
Presented by: F5

Attendees of this class will learn and discuss:

  • Building SSL/TLS designs to mitigate web-based application attacks
  • The importance of FIPS 140-2, and Hardware Security Modules (HSMs)
  • The new DoD standards for SSL and TLS design, and how F5 can help you implement more than one strategy to meet those needs
  • The different SSL and TLS architectures:
    • SSL Offload and Inspection
    • SSL Transformation - Break and Inspect and Re-encrypt
    • Forward Proxy - Outbound SSL Break and Inspect with web content and URL filtering
    • Provide traffic inspection visibility and authentication services - IPS, IDAM, and AAA
    • CAC authentication across all applications, including legacy services
    • Single Sign-On - SSO

 

TechNow - Cloud Security (NIST/FedRAMP/AWS)

Date: Wednesday, December 7, 2016
Time: 800 - 1530
Course Type: Tech - 6.5 hour course
Location: San Miguel Room A

 

UTSA - Education Presentation

Date: Wednesday, December 7, 2016
Time: 800 - 930
Course Type: Tech - 1.5 hour course
Location: San Augustine Room B

 

Wire Data for: Security & CyberHunting

Date: Wednesday, December 7, 2016
Time: 900 - 1030
Course Type: Tech Course
Location: San Augustine B

This class will walk through the fundamentals of using WIRE DATA and the ExtraHop Platform as to combine cyber-hunting strategies and security detection for DOD networks using wire data. Cyber-Hunters seeking new ways to parse through packets, find beaconing, detect anomalous behavior and new strategies for using the richest sources of data - the network. You can't secure what you can't see. No other company offers the East-West visibility that ExtraHop does. Traditional models that depend on protecting the perimeter, just aren't enough. It's understanding what is normal in your environment and then analyzing the behavior.

 

WiSC - Cyber Engineering, Thinking Evil and Doing Good

Date: Tuesday, December 6, 2016
Time: 1300 - 1400
Course Type: PDU/CPE - 1 hour course
Location: San Cristobal Room

This class will offer a discussion on a shift of paradigm towards engineering cyber proactively vice the habits of the past of being reactionary to the problem. Assessing the whole problem not just the networking bits. What is our view of Cyber Engineering and how is different. Focus and Attitude. The value proposition of Cyber Engineering. Thoughts on cultivating the next generations of Cyber Engineers and the products and services they will develop and support. The children are our future. Inform and educate early and often.