8:00am - 5:00pm | Class in session (with breaks) |
---|
8:00am - 5:00pm | Class in session (with breaks) |
---|
8:00am - 5:00pm |
Class in session (with breaks) |
---|
8:00am - 5:00pm |
Class in session (with breaks) |
---|
8:00am - 9:00am |
Keynote: Latest Wireshark Developments & Road MapInstructors: Gerald Combs & Friends |
---|---|
9:30am - 10:30am | ![]() ![]() 01: BACNet and Wireshark for BeginnersInstructor: Werner Fischer |
10:30am - 10:45am | Q & A |
11:00am - 12:00pm | ![]() ![]() 03: IPv6 security assessment tools (aka IPv6 hacking tools)Instructor: Jeff Carrell |
12:00pm - 12:15pm | Q & A |
12:15pm - 12:45pm | Lunch |
12:45pm - 1:45pm | ![]() 05: Kismet and Wireless Security 101Instructor: Mike Kershaw |
1:45pm - 2:00pm | Q & A |
2:15pm - 3:15pm | ![]() 07: TLS encryption and decryption: What every IT engineer should know about TLSInstructor: Ross Bagurdes |
3:15pm - 3:30pm | Q & A |
3:45pm - 4:45pm | ![]() 09: Troubleshooting Cloud Network OutagesInstructor: Chris Hull |
4:45pm - 5:00pm | Q & A |
5:15pm - 6:15pm | ![]() ![]() 11: Automation TIPS & tricks Using Wireshark/tshark in WindowsInstructor: Megumi Takeshita |
6:15pm - 6:30pm | Q & A |
9:30am - 10:30am | ![]() ![]() ![]() 02: Going down the retransmission holeInstructor: Sake Blok |
---|---|
10:30am - 10:45am | Q & A |
11:00am - 12:00pm | ![]() ![]() 04: Improving packet capture in the DPDKInstructor: Stephen Hemminger |
12:00pm - 12:15pm | Q & A |
12:15pm - 12:45pm | Lunch |
12:45pm - 1:45pm | ![]() ![]() 06: Packets! Wait... What? A very improvised last-minute Wireshark talk about things you can find in pcap files that are funny, interesting or weird. I don't know. Let's find out togetherInstructor: Jasper Bongertz |
1:45pm - 2:00pm | Q & A |
2:15pm - 3:15pm | ![]() 08: Why an Enterprise Visibility Platform is critical for effective Packet Analysis?Instructor: Keval Shah |
3:15pm - 3:30pm | Q & A |
3:45pm - 4:45pm | ![]() ![]() 10: TCP SACK overview & impact on performance (subject to change)Instructor: John Pittle |
4:45pm - 5:00pm | Q & A |
5:15pm - 6:15pm | ![]() 12: How Long is a Packet? And Does it Really Matter?Instructor: Dr. Stephen Donnelly |
6:15pm - 6:30pm | Q & A |
8:00am - 9:00am | Keynote: Vern Paxson, Professor of EECS, UC Berkeley/ Chief Scientist, Corelight, Inc. |
---|---|
9:30am - 10:30am | ![]() ![]() 13: Dissector Session TBAInstructor: Roland Knall |
10:30am - 10:45am | Q & A |
11:00am - 12:00pm | ![]() ![]() 15: TLS decryption examplesInstructor: Peter Wu |
12:00pm - 12:15pm | Q & A |
12:15pm - 12:45pm | Lunch |
12:45pm - 1:45pm | ![]() ![]() 17: Analyzing Honeypot TrafficInstructor: Tom Peterson |
1:45pm - 2:00pm | Q & A |
2:15pm - 3:15pm | ![]() ![]() 19: The Other Protocols (used in LTE)Instructor: Mark Stout |
3:15pm - 3:30pm | Q & A |
3:45pm - 4:45pm | ![]() ![]() 21: Ostinato - craft packets, generate trafficInstructor: Srivats P |
4:45pm - 5:00pm | Q & A |
5:15pm - 6:15pm | ![]() ![]() 23: Solving Real World Case StudiesInstructor: Kary Rogers |
6:15pm - 6:30pm | Q & A |
9:30am - 10:30am | ![]() 14: USB Analysis 101Instructor: Tomasz Mon |
---|---|
10:30am - 10:45am | Q & A |
11:00am - 12:00pm | ![]() ![]() 16: The Packet Doctors are in! Packet trace examinations with the experts |
12:00pm - 12:15pm | Q & A |
12:15pm - 12:45pm | Lunch |
12:45pm - 1:45pm | ![]() 18: Intrusion Analysis and Threat Hunting with SuricataInstructors: Josh Stroschein and Jack Mott |
1:45pm - 2:00pm | Q & A |
2:15pm - 3:15pm | ![]() 20: Practical Signature Development for Open Source IDSInstructor: Jason Williams and Jack Mott |
3:15pm - 3:30pm | Q & A |
3:45pm - 4:45pm | ![]() ![]() 22: Introduction to WAN OptimizationInstructor: John Pittle |
4:45pm - 5:00pm | Q & A |
5:15pm - 6:15pm | ![]() ![]() 24: Analyzing 802.11 Powersave Mechanisms with WiresharkInstructor: George Cragg |
6:15pm - 6:30pm | Q & A |