One of the CSX 2018 North America Pre-Conference Workshops this October in Las Vegas, Nevada
CSX 2018 will offers high-impact sessions uniquely built around numerous cyber tracks. CSX sessions provide unique opportunities to learn from top experts in the field. This pre-conference hands-on technical cybersecurity training answers these questions:
- Have you downloaded Kali or other security tools and suites but never quite figured out how to do really useful things with it?
- Were you once technical and now want to get your technical chops back?
- Are you new to technical cybersecurity?
Does it seem like magic when you see forensics, hacks, or penetration testing done?
- Never hacked a box, performed packet forensics, or memory forensics?
- Never actually seen an attack happen in real time?In this training session, people will spend one day walking through completing a successful penetration of a server, then spend day 2 doing incident response and forensics on the server and network you spent day one exploiting. The only pre-requisite skill needed is basic familiarity with the Windows operating system. You will learn the Linux techniques you need during the training.You will leave with the tools and techniques to continue learning and more importantly demonstrate to others what the attacks look like, and how to investigate them.
About ISACA: As an independent, nonprofit, global association, ISACA engages in the development, adoption, and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves. https://www.isaca.org/
Instructor: Keatron Evans is the Managing Partner at KM Cyber Security, LLC, https://kmcybersecurity.com, and responsible for global information security consulting business which includes penetration testing, incident response management/consulting, digital forensics, and training. Keatron is also a Senior Security Advisor at Savvius, and a top-rated instructor for ISACA a global association of 140,000 professionals in 180 countries that helps business and IT leaders maximize value and manage risk related to information and technology. He is also one of the authors of Chained Exploits: Advancing Hacking Attacks from Start to Finish, a textbook still used by U.S. Government Security Agencies.