The Weird (Career) Path in InfoSec - 10:00 am - 10:45 am

Finding the Right Tools and Codes for Your Career Search - 11:00 am - 11:45 am

Resume Review - 12:00 pm – 1:30 pm

Lighting Talks 1:30pm - 3:00pm

Cost $20.00 includes lunch.



This will provide the basic knowledge of successfully deploying VSTS utilizing Fortify & WebInspect.

Cost $20.00 includes lunch.



This simulated APT and Ransomware attack will give you an insight into how a threat hunting team investigates current cyber adversaries through the use of practical examples

Cost $20.00 includes lunch.


5/10 | GORUCK Constellation - Custom (One-Day-Course) *** MOVED TO 5/5

GORUCK has consolidated and scheduled (2) Constellations on Saturday 5/5 you can enroll in them and save 20% using code: Z45722PCB923

Constellation 6: New York, NY 05/05/2018 09:00 -

Constellation 12: New York, NY 05/05/2018 18:00 -

You and your cell will move throughout the city with a rucksack of supplies and learn what escape and evasion looks and feels like in a time of chaos. Once you see the constellations, you know exactly how to find them no matter where you are. This knowledge makes you a hard target. Upon successful completion, you’ll earn the GORUCK CONSTELLATION patch, which will never be for sale.

Don't miss this mission.

(One-Day-Course) | $295pp 10% Donated to Veterans Associations 

Course Syllabus

5/9 Web Hacking Jutsu with Burp Suite - Genin Level (下忍)

● Introduction to and hands-on use of Burp Suite Professional

● Gain first-hand experience with web vulnerabilities by discovering and exploiting them in web apps, using both manual and automated techniques

● Students will leave with an understanding of how to find and exploit the most common and dangerous flaws in web applications

● Begin working through the OWASP Testing Guide as a methodology for how to test app security

(One-Day Course) | $995pp | Instructor: David Rhoades

Course Syllabus

5/9-5/10 | Secure Coding in C and C++ 

Secure Coding Training in C and C++ provides a detailed explanation of common programming errors in C and C++ and describes how these errors can lead to code that is vulnerable to exploitation. This course concentrates on security issues intrinsic to the C and C++ programming languages and associated libraries. 

(One-Day Course) | $1500pp | Instructor: Prof. Robert Seacord

 Course Syllabus

5/9 | Radicalization and Counter/Cyber Jihadist Operations Analyst

The end state of CSFI's unique Radicalization and Counter/Cyber Jihadist Operations Analyst (RCCJOA) training and certification is to support the warfighter, the intelligence community, and law enforcement to strategically defeat terrorist organizations and their affiliates and adherents through the use of cyberspace.

(One-Day-Course) | $1300pp | Instructor: Mubin Shaikh

Course Syallbus

5/9-5/10 | Firmware Exploitation and Attack Countermeasures 

The IoT Firmware Exploitation and Attack Countermeasures training is designed to provide techniques for testing of embedded IoT systems, employing proactive controls, embedded application security best practices, and address the challenges of building security into embedded devices. This course is suited for embedded systems engineers, software developers, and security professionals.

(Two-Day-Course) $1500pp Instructor: Aaron Guzman

Course Syllabus

5/9-5/10 | STORM-HACKING

Module 01: - Introducing The STORM!
Module 02: - Network Security Threats, Vulnerabilities, and Attacks
Module 03: - Network Traffic Monitoring and Analysis
Module 04: - Network Risk and Vulnerability Management
Module 05: - Introduction to Ethical Hacking 
Module 06: – Footprinting 
Module 07: – Scanning
Module 08: – Enumeration 
Module 09: – System Hacking/Hacking Wireless Networks 

(Two-Day-Course) $1995pp Instructor: Kevin Cardwell

Course Syllabus

5/10 | Industrial Control Systems (ICS)

What Students Will Learn:

·      Introduction to commonly used field devices used in various industries. Students will be introduced to old-school devices and the latest generation and why it matters.

·      PLC, PAC, DCS, IED, RTU, what are these and what do they do?

·      Is everything on the plant floor really insecure?

·      What can be done to secure what is in your plant already.

(One-Day-Course) | $1000pp | Instructor: Tom Vannorman

Course Syllabus




23470 hits


 Code of Conduct  Press Releases
 Get Involved   Report ISSUE / BUG

The Critical Infrastructure Association of America, Inc. is a 501(c)6 Not for Profit. The mission of Critical Infrastructure Association of America is to create a membership-based, trade association of like-minded cybersecurity and closely related industry professionals that work in the field of cybersecurity. The goal is to share best practices, establish and maintain high operational standards and to educate and interact with those in the cybersecurity community within public, private and governmental sectors.