





Sam Bowne & Team - Beginner's Guide to Attacks and Defenses- DCTLV2025 **4-Day Training**
**Please note: This is a four-day training that will be held Saturday-Tuesday (August 9-12). Participants will receive entry into DEF CON on Friday, August 8 with their registration**
Name of Training: Beginner's Guide to Attacks and Defenses
Trainer(s): Sam Bowne, Elizabeth Biddlecome, Kaitlyn Handelman, and Irvin Lemus
Dates: August 9-12, 2025 **4-day training**
Time: 8:00 am to 5:00 pm PT
Venue: Las Vegas Convention Center
Cost: $3,000
Course Description:
We will survey modern attack and defense techniques at an introductory level. We will demonstrate all the techniques, and participants will perform hands-on projects practicing with the tools. We will provide beginner-friendly instructions, a live CTF scoreboard, and personal assistance.
Course Outline:
Day 1: Intro to Attack Techniques for Both Windows and Linux Systems
Learn fundamental tools and techniques used to attack Windows and Linux systems. Topics include Linux and Windows command-line, command injection, SQL injection, network discovery, and vulnerability scanning.
Day 2: Intro to Exploit Development: Finding Vulnerabilities and Taking Advantage of Them
Learn how software uses memory, and why computers are so easily tricked into executing bytes as code that entered the system as data. Learn how to develop binary exploits including buffer overflows on the stack and the heap, format string vulnerabilities, and race conditions.
We will examine modern Windows defenses and learn how to defeat them.
Day 3: Intro to Malware analysis: Learn Windows Internals and How Malware Operates
Analyze malware to find indicators of compromise using static and dynamic techniques. We will modify Windows executables to cheat at games and examine malware's actions, including droppers, botnets, and keyloggers.
Day 4: Intro to Incident Response: detecting attacks and analyzing intrusions
This class covers essential Incident Response tools and techniques to defend modern corporate networks.
Difficulty Level:
Beginner
Suggested Prerequisites:
Participants should be familiar with basic networking, security, and programming concepts.
What Students Should Bring:
Participants need a laptop computer capable of running local virtual machines. A second screen will be very helpful. They should also have a credit card to apply for free cloud server hosting.
Trainer(s) Bio:
Sam Bowne has been teaching computer networking and security classes at City College San Francisco since 2000. He has given talks and hands-on trainings at DEF CON, DEF CON China, Black Hat USA, HOPE, BSidesSF, BSidesLV, RSA, and many other conferences and colleges. He founded Infosec Decoded, Inc., and does corporate training and consulting for several Fortune 100 companies, on topics including Incident Response and Secure Coding.
Elizabeth Biddlecome is a consultant and instructor, delivering technical training and mentorship to students and professionals. She leverages her enthusiasm for architecture, security, and code to design and implement comprehensive information security solutions for business needs. Elizabeth enjoys wielding everything from soldering irons to cripting languages in cybersecurity competitions, hackathons, and CTFs.
Kaitlyn Handelman is an offensive security engineer at Amazon. Her focus is cybersecurity in space. In addition to traditional penetration testing, Kaitlyn works on physical devices and RF signals. In her free time, she enjoys ham radio, astronomy, and her cat, Astrocat.
Irvin Lemus, CISSP is a Cyber Range Engineer at By Light IT Professional Services, training military personnel through international cyber security exercises. Irvin has been in the field since 2006, involved with cybersecurity competitions since 2015 as a trainer, coach, and mentor. He also has taught IT and Cybersecurity courses at Coastline and Cabrillo Colleges. He is the BACCC Cyber Competitions Regional Coordinator, Board member at Pacific Hackers and is a speaker at DEFCON. He describes himself as, "A professional troublemaker who loves hacking all the things."
Registration Terms and Conditions:
Trainings are refundable before July 8, 2025, minus a non-refundable processing fee of $250.
Trainings are non-refundable after July 8, 2025.
Training tickets may be transferred. Please email us at training@defcon.org for specifics.
If a training does not reach the minimum registration requirement, it may be cancelled. In the event the training you choose is cancelled, you will be provided the option of receiving a full refund or transferring to another training (subject to availability).
Failure to attend the training without prior written notification, will be considered a no-show. No refund will be given.
By purchasing this ticket you agree to abide by the DEF CON Training Code of Conduct and the registration terms and conditions listed above.
Several breaks will be included throughout the day. Please note that food is not included.