Hacker Halted

Hacker Halted is a global series of Computer and Information Security conferences presented by EC-Council. The objective of the Hacker Halted conferences is to raise international awareness towards increased education and ethics in IT Security. The event is currently in its 14th year. Also present at Hacker Halted is EC-Council's H@cker Halted | Academy, trainings and workshops led by EC-Council instructors and trainers.

Past Conferences

Hacker Halted Malaysia

Hacker Halted Malaysia was held in 2004, 2007, and in 2008 in Kuala Lumpur.[1][2][3]

Hacker Halted Egypt 2010

Hacker | Halted conference was held in Egypt on 13 and 14 December 2010.

Hacker Halted Dubai

Hacker Halted Dubai was held in 2005 and in 2006 in Dubai, United Arab Emirates.[4][5]

Hacker Halted Singapore

Hacker Halted Singapore was held in 2005 in Singapore.[6]

[7]

Hacker Halted Mexico

Hacker Halted Mexico was held in 2005 in Mexico.[8]

Hacker Halted Japan

Hacker Halted Japan was held November 11, 2008 in Tokyo, Japan.[9]

Hacker Halted USA

Hacker Halted USA was held in 2008 in Myrtle Beach, South Carolina

Hacker Halted USA was held in September 20–24, 2009 in Miami, Florida, at the Hilton Head hotel, and will include events to include a "Capture the Flag" event.[10][11][12]

Hacker Halted USA was held in 2010 in Miami.

Hacker Halted USA was held in Miami on 25 and 27 October 2011. The theme for 2011 was "Stop the Data Leaks. Secure the Code".

Hacker Halted USA was held in Miami on October 29–31, 2012.

Hacker Halted USA was held in Atlanta in 2013, 2014, 2015, 2016.

Upcoming Conferences

Hacker Halted USA 2016 returns to Atlanta, GA [13]

Conference Tracks

Some of the talks will include tracks to include:[14]

H@cker Halted Academy

Hacker Halted USA 2009 was the launch of the Hacker Halted Academy.[15][16] The Hacker Halted Academy is a series of classes presented by EC-Council partners. Many of the classes include EC-Council training and certification, including the Certified Ethical Hacker and Licensed Penetration Tester, as well as vendor specific certification, including, Certified Information Systems Security Professional(CISSP) and NSA NSA Information Security Assessment Methodology(IAM)/Information security Evaluation Methodology(IEM) training.[17][18]

See also

References

External links

This article is issued from Wikipedia - version of the 4/12/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.