Technical Managers, Security Managers, Security Analysts, and Incident Responders
During this interactive two-day course, you will learn about strategies and actionable techniques to detect, prevent and protect against advanced threats.
Acting as a Red Team, we will adopt an attacker's mindset and demonstrate a real-world attack methodology. We will show how hackers conduct an AV bypass, sandbox bypass, and exploitation, post-exploitation and review how to better defend these common attacks with appropriate administrative and technical controls.
This training will satisfy 16 hours of your Continuing Professional Education (CPEs) towards your CISSP continuing education requirements.
Consortium Network's intelligence forum is a group of subject matter experts who share information about the technologies they have deployed to solve complex business security problems. Participants share intelligence on established companies and new start-ups and the emerging risks and problems they solve. As a result, the Consortium maintains lists of technologies and solution providers that can help you address a security breach or incident.
The Consortium is the first organization dedicated to providing real-world feedback and data on tools used in production environments at peer organizations. This data will help improve your security posture by delivering first-hand accounts of how a security problem was addressed by a particular vendor technology. Learn more at www.consortium.net.
We would like to thank our event sponsors.