Upcoming Courses

       The PSCG is The Linux Foundation Authorized Training Partner

Linux Foundation open enrollment courses in Israel in Q1 2017

posted Jan 6, 2017, 10:05 AM by Ron Munitz   [ updated Jan 6, 2017, 10:13 AM ]

The next public Linux Foundation courses that will be taught by Ron Munitz in Israel in 2017 are:
  1. LFD420 - Linux Kernel Development and Internals -  January 22,23, February 1,2.
    This course is a prerequisite for the security course and device drivers course.
  2. LFD440 - Linux Kernel Security and Debugging - Two instances planned (one in Haifa, one in Tel-Aviv):
    1. February 6-9
    2. March 5,6, 12,13 (פורים שמח ומבדח!)
  3. Modern Embedded Linux for Decision Makers and Developers Israel - March 26
  4. LFD435 - Embedded Linux Device Drivers  - March 27-30
In addition, there is a good chance that Ron Munitz's Android Internals course will be given sometime in Q1 or Q2 as well. Contact us for more information.

Our courses are given in Haifa, Tel-Aviv and its surrounding,  and Jerusalem. 
Exact location will be given upon registration. 

For quotes and registrations please contact training@thepscg.com

קורס קרנל פומבי של ה Linux Foundation בישראל - 22,23 בינואר, 1,2 בפברואר 2017

posted Jan 6, 2017, 6:37 AM by Ron Munitz   [ updated Jan 6, 2017, 7:21 AM ]

בהמשך להצלחה בחג החנוכה, ועקב בקשות למופע נוסף לאלו שלא הספיקו להשיג אישורים תקציביים מהחברות שלהם, רון מוניץ ילמד בסוף חודש ינואר קורס פומבי בנושא פיתוח קרנל, ואינטרנלס.
הקורס הינו קורס רשמי של ה Linux Foundation.
הקורס מתאים למפתחי קרנל עתידיים\נוכחיים שרוצים לעשות סדר בדברים, ולמומחי אבטחת מידע.
הקורס יערך במרכז הארץ או בחיפה (כתלות בנרשמים המהירים), בשפה העברית, בתאריכים הבאים:
22 בינואר, 23 בינואר, 1 בפברואר, 2 בפברואר. הקורס מפוצל לשני שבועות, בכדי להקל על חברות - (וגם כי רון עסוק בין לבין :-) )

להצעת מחיר והרשמה ,יש לשלוח מייל ל training@thepscg.com

שימו לב שהקורס הוא תנאי חובה למגיעים למופעי קורסי אבטחת ודיבאגינג הקרנל שיינתנו בחודש פברואר ומרץ, וחוקרים בלי נסיון משמעותי בקרנל לא יוכלו להרשם לקורסים הבאים מבלי לקחת את הקורס הנוכחי.




4 Day Kernel Internals And Development in Tel Aviv Israel, December 26-29, 2016

posted Dec 1, 2016, 12:23 AM by Ron Munitz

בחג החנוכה הקרב עלינו לטובה, רון מוניץ ילמד קורס פומבי בנושא פיתוח קרנל, ואינטרנלס.
הקורס הינו קורס רשמי של ה Linux Foundation.
הקורס מתאים למפתחי קרנל עתידיים\נוכחיים שרוצים לעשות סדר בדברים, ולמומחי אבטחת מידע.
הקורס יערך במרכז הארץ, בשפה העברית, בתאריכים 26-29 בדצמבר.

להצעת מחיר והרשמה, ,יש לשלוח מייל ל training@thepscg.com




Linux Kernel Internals and Development (LFD420)

Length: 4 Days

Type: Hands-On

Target Audience: Prospective Linux Kernel developers, security researchers, board designers, system administrators, Real-Time/embedded engineers making the transition to Linux, device drivers developers.


Prerequisites:

  • Essential:

    • The attendees should proficient with C and assembly language

  • Recommended:

    • Working knowledge of Linux command line tools

    • Previous Device Driver or Embedded Linux experience


Summary:

Linux Kernel Internals and Development course provides experienced programmers with a solid understanding of the Linux kernel. Upon mastering this material, you will have a basic understanding of the Linux architecture, kernel algorithms, scheduling, hardware and memory management, modularization techniques and debugging, as well as how the kernel developer community operates and how to efficiently work with it. The course includes extensive hands-on exercises and demonstrations designed to give you the necessary tools to develop and debug Linux kernel code.

The course is based on both the most upstream recent Linux kernel version, and maintains compatibility with the kernel versions used by at least the last two releases of the major Linux distributions.

Note: The course can be customized to a 5 day version which includes more debugging material.


Outline:

  1. Introduction

    • Objectives

    • Who You Are

    • The Linux Foundation

    • Linux Foundation Training

    • Course Registration

  2. Preliminaries

    • Procedures

    • Things change in Linux

    • Linux Distributions

    • Kernel Versions

    • Kernel Sources and Use of git

    • Platforms

    • Documentation and Links

  3. Kernel Architecture I

    • UNIX and Linux **

    • Monolithic and Micro Kernels

    • Object-Oriented Methods

    • Main Kernel Tasks

    • User-Space and Kernel-Space

    • Kernel Mode Linux **

  4. Kernel Programming Preview

    • Error Numbers and Getting Kernel Output

    • Task Structure

    • Memory Allocation

    • Transferring Data between User and Kernel Spaces

    • Linked Lists

    • String to Number Conversions

    • Jiffies

    • Labs

  5. Modules

    • What are Modules?

    • A Trivial Example

    • Compiling Modules

    • Modules vs Built-in

    • Module Utilities

    • Automatic Loading/Unloading of Modules

    • Module Usage Count

    • The module struct

    • Module Licensing

    • Exporting Symbols

    • Resolving Symbols **

    • Labs

  6. Kernel Architecture II

    • Processes, Threads, and Tasks

    • Process Context

    • Kernel Preemption

    • Real Time Preemption Patch

    • Dynamic Kernel Patching

    • Run-time Alternatives **

    • Porting to a New Platform **

  7. Kernel Initialization

    • Overview of System Initialization

    • System Boot

    • Das U-Boot for Embedded Systems**

  8. Kernel Configuration and Compilation

    • Installation and Layout of the Kernel Source

    • Kernel Browsers

    • Kernel Configuration Files

    • Kernel Building and Makefiles

    • initrd and initramfs

    • Labs

  9. System Calls

    • What are System Calls?

    • Available System Calls

    • How System Calls are Implemented

    • Adding a New System Call

    • Replacing System Calls from Modules

    • Labs

  10. Kernel Style and General Considerations

    • Coding Style

    • kernel-doc **

    • Using Generic Kernel Routines and Methods

    • Making a Kernel Patch

    • sparse

    • Using likely() and unlikely()

    • Writing Portable Code, CPU, 32/64-bit, Endianness

    • Writing for SMP

    • Writing for High Memory Systems

    • Power Management

    • Keeping Security in Mind

    • Mixing User- and Kernel-Space Headers **

    • Labs

  11. Race Conditions and Synchronization Methods

    • Concurrency and Synchronization Methods

    • Atomic Operations

    • Bit Operations

    • Spinlocks

    • Seqlocks

    • Disabling Preemption

    • Mutexes

    • Semaphores

    • Completion Functions

    • Read-Copy-Update (RCU)

    • Reference Counts

    • Labs

  12. SMP and Threads

    • SMP Kernels and Modules

    • Processor Affinity

    • CPUSETS

    • SMP Algorithms - Scheduling, Locking, etc.

    • Per-CPU Variables **

    • Labs

  13. Processes

    • What are Processes?

    • The task_struct

    • Creating User Processes and Threads

    • Creating Kernel Threads

    • Destroying Processes and Threads

    • Executing User-Space Processes From Within the Kernel

    • Labs

  14. Process Limits and Capabilities **

    • Process Limits

    • Capabilities

    • Labs

  15. Monitoring and Debugging

    • Debuginfo Packages

    • Tracing and Profiling

    • sysctl

    • SysRq Key

    • oops Messages

    • Kernel Debuggers

    • debugfs

    • Labs

  16. Scheduling Basics

    • Main Scheduling Tasks

    • SMP

    • Scheduling Priorities

    • Scheduling System Calls

    • The 2.4 schedule() Function

    • O(1) Scheduler

    • Time Slices and Priorities

    • Load Balancing

    • Priority Inversion and Priority Inheritance **

    • Labs

  17. Completely Fair Scheduler (CFS)

    • The CFS Scheduler

    • Calculating Priorities and Fair Times

    • Scheduling Classes

    • CFS Scheduler Details

    • Labs

  18. Memory Addressing

    • Virtual Memory Management

    • Systems With no MMU

    • Memory Addresses

    • High and Low Memory

    • Memory Zones

    • Special Device Nodes

    • NUMA

    • Paging

    • Page Tables

    • page structure

    • Kernel Samepage Merging (KSM) **

    • Labs

  19. Huge Pages

    • Huge Page Support

    • libhugetlbfs

    • Transparent Huge Pages

    • Labs

  20. Memory Allocation

    • Requesting and Releasing Pages

    • Buddy System

    • Slabs and Cache Allocations

    • Memory Pools

    • kmalloc()

    • vmalloc()

    • Early Allocations and bootmem()

    • Memory Defragmentation

    • Labs

  21. Process Address Space

    • Allocating User Memory and Address Spaces

    • Locking Pages

    • Memory Descriptors and Regions

    • Access Rights

    • Allocating and Freeing Memory Regions

    • Page Faults

    • Labs

  22. Disk Caches and Swapping

    • Caches

    • Page Cache Basics

    • What is Swapping?

    • Swap Areas

    • Swapping Pages In and Out

    • Controlling Swappiness

    • The Swap Cache

    • Reverse Mapping **

    • OOM Killer

    • Labs

  23. Device Drivers**

    • Types of Devices

    • Device Nodes

    • Character Drivers

    • An Example

    • Labs

  24. Signals

    • What are Signals?

    • Available Signals

    • System Calls for Signals

    • Sigaction

    • Signals and Threads

    • How the Kernel Installs Signal Handlers

    • How the Kernel Sends Signals

    • How the Kernel Invokes Signal Handlers

    • Real Time Signals

    • Labs


** These sections may be considered in part or in whole as optional. They contain either background reference material, specialized topics, or advanced subjects. The instructor may choose to cover or not cover them depending on classroom experience and time constraints


3 Day Web and Mobile Security Training in London, UK - October 24-26, 2016

posted Sep 16, 2016, 11:23 AM by Ron Munitz   [ updated Sep 16, 2016, 11:26 AM ]

On October 24-26, 2016, I will be teaching my 3-day Web and Mobile course at CodeNode
Registration is via the following link, and the full course outline is listed below.
Note the insane discounts for those who will
register by the end of next week


Description

In this hands-on course, you will learn how to secure your Web and Mobile applications, as well as how the Android Platform handles security from the inside-out. You will learn about leading attack vectors on web applications (including mobile web and native mobile), via a combination of theoretical lectures, vulnerability identifying labs, and vulnerability fixing labs.

By the end of this course you will be able to better protect your web and mobile application code, the organization’s Intellectual Property and the application user’s data, in addition to getting a lifetime worth skill of obtaining an attacker point of view approach to writing more secure and more robust code.


Duration: 3 Days

To take this course, you must have practical software development experience, and feel comfortable about getting into new concepts and programming languages.
In particular, you must have a working knowledge of Java. 
Android development experience is recommended, but developers new to Android would also benefit significantly from the course.

Objectives

Upon completion of this course, you will be able to:

  • Recognize and avoid insecure patterns in code

  • Use the most suitable security APIs when coding

  • Understand the difference between web and mobile security state of mind.

  • Understand and mitigate the risks of Web Applications

  • Understand and mitigate the risks of the Android ecosystem

  • Use penetration testing tools to find vulnerabilities in code


Audience

Web and mobile developers, both backend and frontend developers.
Security personnel, development managers and decision makers would benefit significantly from the theoretical sessions and demonstrations.  

Outline

Introduction to Security

  • Introduction to Security

  • Legacy and modern threats

  • Physical and Hardware Security

  • Cyber Security terminology

  • Real-time attack map demonstration. Why and who should be worried.

  • Present-time attack vectors

  • Present-time defense solutions


Binary Exploitation Overviw

  • Motivation: Exploit Piggy-backing on Higher Level Technologies

  • Buffer Overflows and stack smashing attacks 

  • Shellcode construction 

  • String format errors 

  • Integer overflows 

  • Heap overflows and heap spraying techniques, memory corruption and double free attacks

  • Understanding dynamic library and hooking injection attacks, misusing LD_PRELOAD

  • Compiler and Operating System mitigation techniques 

  • Return Oriented Programming and mitigation techniques

  • Understanding combined data leak attacks

  • Piggy-Backing revisited: Attacks on PDF, Flash, JavaScript, WebKit, Email, Images, Video Payload, Applets, JVM.

Web Application Security

  • Web Application Architecture

  • The OWASP top 10 vulnerabilities

    • A1-Injection

    • A2-Broken Authentication and Session Management

    • A3-Cross-Site Scripting (XSS)

    • A4-Insecure Direct Object References

    • A5-Security Misconfiguration

    • A6-Sensitive Data Exposure

    • A7-Missing Function Level Access Control

    • A8-Cross-Site Request Forgery (CSRF)

    • A9-Using Components with Known Vulnerabilities

    • A10-Unvalidated Redirects and Forwards

  • OWASP top 10 Labs

    • Vulnerability identification

    • Vulnerability exploitation

    • Vulnerability fix

    • Using WebGoat and Zed Attack Proxy

Cryptographic Risks

  • The Problem With Passwords

    • Using Weak Passwords

    • Password Iteration

    • Default Passwords

    • Password Replay Attacks

    • Stop Storing Plaintext Password  

    • Rainbow Tables Explained

    • Too Much Information -­ Invalid User or Password

  • The Problem With Random Numbers

    • PRNG, CRNG and TRNG

    • Find Code That Use Incorrect RNG

    • Determine Properly Seeded CRNG

  • The Problem With Crypto Algorithms

    • Roll Your Own Algorithm

    • Using The Wrong Algorithm

    • Forgetting The Salt

    • The Difference Between Authentication, Encryption and Temper-­Proofing

    • Algorithms Are Not Future­-Proof

Network Protocols Security

  • The 5/7 Layers Models

  • Network Traffic Risks

    • Eavesdropping

    • Replay

    • Spoofing

    • Tempering

    • Hijacking

  • Network Vulnerabilities

    • ARP Poisoning

    • Man In The Middle

    • (D)DoS Attacks

  • Network Authentication and Protocols

    • Kerberos / NTLM

    • SSL and HTTPS

  • Further traffic sniffing: Wireshark, Charles Proxy, Burp Suite and ZAP.


Android Security

In this section, most of the topics here will be discussed and presented with demos, with hands-on labs on the Secure programming sections (using the Java Cryptography Engine API in Android, and applying permissions).

  • Android Overview - Bottom up discussion

    • Hardware overview: What makes an Android device.

    • Linux Kernel boot process and provided functionalities

    • Native User Space: Init services, daemons, executables and libraries

    • Enabling Java (Dalvik + ART)

    • JNI bridge layer

    • Java OS Layer (Android Frameworks)

    • Application (APK) Structure

    • System Applications

    • User Applications

    • Google Play Services

  • Android Platform Security

    • Linux driven security sandbox

    • OS and binary protection and exploitation: ASLR, PIE, DEP, RoP et. al.

    • Android hardware related permission enforcement

    • SELinux on Android

    • Data partition forensics protection via Internal and external storage encryption

    • Secure Boot

    • Android Signature model and verification:

      • Platform keys and platform app signing. Google, OEM’s and integrators.

      • Third party (and play store) application signing.

    • Android application sandbox: Single and multi physical user.

    • Android Permissions:

      • Pre-Marshmallow (API Level < 23)

      • Post-Marshmallow: User policies, user responsibilities, application developer responsibilities, dynamic permission checking and revocation.

      • Defining custom permissions, restricting Application components (Activity, Service, Content Provider, Broadcast Receiver)

    • Android Security Patches

    • Android Nougat Security Features (NEW!)

  • Android Application Secure Coding I: Code and app behavior

    • Reverse Engineering and Data extraction demo: Motivation.

    • Code protection techniques: Obfuscation, stripping, encryption, anti-tampering techniques. Native code techniques with NDK, gcc, and clang.

    • SQL Injection and protection from it.

    • Manifest level component access control

    • IPC level runtime component access control

    • Webview and Javascript protection/restriction best practices for hybrid apps

    • Protecting from other applications, protecting from user judgement

    • Dynamic permission control best practices

    • Introduction to Android cryptography: BouncyCastle, BoringSSL

    • Protecting WebView code

  • Android Application Secure Coding II: Securing User and Application data.

    • Android Storage layout - what’s open and what’s not.

    • SQLite inspection and protection with CQLCipher

    • Introduction to applied cryptography

      • Cryptography goals: Authentication, Integrity, Encryption.

      • Symmetric and Asymmetric cipher suites

      • Key generation techniques and trade-offs

      • Software vs. Hardware based techniques.

    • Android Applied cryptography

      • Protection models (Encryption vs. Authentication)

      • Software based protection via software based cryptography

      • Hardware based protection via the keystore

  • Android Application Secure Coding III: Secure Network Communications

    • Network privacy dangers: Packet sniffers and interceptors. MITM attacks.

    • Certificate Authority (CA) Chain of trust: A solution and the introduced problems

    • Secure communication with TLS/SSL

    • Encrypted network privacy dangers: Sniffers and interceptors. MITM attacks.

    • CA management in Android: Platform and application management

    • Custom TrustManager’s and Certificate pinning

    • IP layer security, introducing VPN API.

1-Day Introduction to Kernel development and debugging crash course in Tel-Aviv - April 24th - By Ron Munitz

posted Apr 9, 2016, 12:10 PM by Ron Munitz   [ updated Apr 9, 2016, 12:19 PM ]

Given some very on-site training requests for similar contents that were very well received, I am going to offer a series of one day workshops with the aim of 
helping prospective new Kernel developers to start their Kernel development journey on the right foot.

The first public instance of the course will be on Sunday, April 24th, 2016 - Location will be given upon registration (Tel-Aviv area).


The course outline is as follows:

  • History and Overview

  • Kernel versioning, applying (reverting) patches

  • Kernel and GIT

  • Kernel vs. Userspace programming

  • Understanding different contexts, interrupt handling, deferred handlers etc.

  • Configuring, building and running the kernel (native, and cross)

  • Remote and Native kernel debuggers

  • Kernel profiling techniques

  • Kernel programming style and working with the community


Upon completing this course you will feel comfortable rolling your own kernels, navigating the kernel source and knowing where to look for what, and debugging kernels on both Dekstop, Server, and Embedded platforms (both X86_64 and ARM32/ARM64)

For further inquiries and registration - Please send an email to training@thepscg.com

Number of spots is limited.



Android Internals and Android Security in Israel in 2015 and early 2016

posted Nov 14, 2015, 12:38 AM by Ron Munitz

As I mentioned in MobModCon, public courses will be opened according to demand.
I would normally open a course for a group of 6 or more, verifying the attendees backgrounds are adequate.  
If you want to participate in a course please send  an email to training@thepscg.com explaining who you are, what course you are interested in, and what months would be relevant,
and I will get back to you shortly with updates and further explanations. 



Android Security Tel-Aviv, October 18-20 is sold out.

posted Oct 2, 2015, 2:55 PM by Ron Munitz

The upcoming Android Security course planned on October 18th is sold out, and unfortunately I cannot accept any more registrations.
 
Given the number of inquiries, I may open another course towards the end of the month, and at the moment it seems the chances are high the course will indeed open. 
Otherwise, the next Public course is scheduled for Q1 2016. 

Should you be interested in a public course this month, or in corporate training - email training@thepscg.com .

A number of Public "Android Security" courses will be given during October and November of 2015 in the EMEA

posted Sep 3, 2015, 3:20 AM by Ron Munitz   [ updated Oct 2, 2015, 2:51 PM ]

Courses will be announced at MobSecCon, Codemotion, DevOxx and Voxxed days, and as always, discounts will be given to paid and registered attendees of those conferences.
For inquiries ==> training@thepscg.com 

5 day Advanced Native Android Programming in Tel-Aviv - July 5-9, 2015

posted Apr 24, 2015, 11:08 AM by Ron Munitz   [ updated Apr 24, 2015, 3:19 PM ]

Ron Munitz will teach an Advanced Native Android Programming course for developers who need to get the critical extra performance (and security!) gain for their Android Application or platform, leveraging on JNI, NDK and native code techniques.

The target audience is mostly (and not limited to) Application developers who work on time critical apps, Video, Audio, Platform developers, and developers interested in porting their (non-Java) code to Android.


More details...

5 day Linux Kernel Bootcamp in Tel-Aviv - June 28 - July 2

posted Apr 24, 2015, 10:42 AM by Ron Munitz   [ updated Apr 24, 2015, 3:14 PM ]

Ron Munitz will be teaching a Linux Kernel Bootcamp for engineers who want to take their first expert-guided steps with the Linux kernel.

The target audience is embedded software developers, userspace developers who want to make the transit to kernel space, security researchers, Hardware engineers making a transition to software and Linux, and Linux/Android prospective device driver or/and porting engineers. 

The course is based on the new Kernel version 4.0


More details...

1-10 of 11