THREAT HUNTING: IDENTIFYING POOR IT HYGIENE This is the second course of four in the series
June 13, 2019 @ 8:30 AM
Millennium Hilton New York Downtown | 55 Church Street | New York, NY 10007
Thank you for your interest in this event. We no longer have any spots available. Please contact email@example.com to be placed on the waiting list. Thank you!
Who Should Attend
Security Managers, Analysts, Incident Responders, and Professionals Interested in Threat Hunting
Training Session Cost
Free to attend
During this one-day interactive event, you will be provided with a unique opportunity, where you will be immersed into an interactive one-day security training course. This hands-on course, offered by Consortium Networks, focuses on identifying poor IT hygiene practices that are commonly exploited by attackers to compromise organizations. The course is a combination of lecture and hands-on labs and will cover the following topics:
Popular breaches resulting from poor IT hygiene
Vulnerability vs. misconfiguration
Common host misconfigurations, account misconfigurations, and network misconfigurations
Tools for detection and migration
This training will satisfy 7 hours of your Continuing Professional Education (CPEs) towards your CISSP/CIEE continuing education requirements. Training Certificates provided upon request.
Registration begins at 8:30 AM
This is a seven-hour training course (9:00 AM - 4:00 PM)
Light breakfast and lunch will be provided
Other Scheduled Courses
Course 2 is the second class in a 4-part series. Below, you will find the other courses in the series. The dates for these courses will be determined soon.
Situational Awareness with Open Source Tools (Intermediate)
A deep dive into open source tools and how to use them as part of your security posture. Various tools will be discussed to aid in forensics, hunting, incident response, vulnerability discovery, and situational awareness. Participants of this course will become better equipped to analyze their organization using additional open source tools.
Fun with Buffer Overflows (Advanced)
Target Audience: Senior Analysts, Pen Testers, and Application Testers
This is an advanced course to demonstrate the danger of outdated software, specifically those related to BO vulnerabilities. Participants of this class will be introduced to application testing and how to execute BOF attacks against vulnerable software.
About the Trainer - Barry Morgan
Barry Morgan is a cybersecurity expert and owner of Hackingbit, LLC., which performs advanced cyber threat simulations, red team/blue team training, and designing remediation strategies to mitigate advanced threats.
Barry has over 20 years of cybersecurity experience and has supported various state and federal government agencies including the United States Air Force, Social Security Administration, Environmental Protection Agency, and the NC Department of Health and Human Services.
Prior to 2014, Barry worked for Computer Sciences Corporation as a security consultant, where he provided a variety of defensive security support services to government agencies. Barry performed malware analysis and cyber forensics for the SSA, intrusion detection monitoring and response for the US Air Force, and vulnerability management for the EPA. Aside from his work as a government contractor, Barry is also a 20-year veteran of the USAF, where still serves as a traditional Guardsman in one of the first cyberwarfare units in the nation.
About Consortium Networks
Consortium Network's intelligence forum is a group of subject matter experts who share information about the technologies they have deployed to solve complex business security problems. Participants share intelligence on established companies and new start-ups and the emerging risks and problems they solve. As a result, the Consortium maintains lists of technologies and solution providers that can help you address a security breach or incident.
The Consortium is the first organization dedicated to providing real-world feedback and data on tools used in production environments at peer organizations. This data will help improve your security posture by delivering first-hand accounts of how a security problem was addressed by a particular vendor technology. Learn more at www.consortium.net.
Thank You to Our Sponsors
We would like to thank our event sponsors.
Location that you'll be looking for
Millennium Hilton New York Downtown
55 Church Street
New York, NY 10007