This is the second course of four in the series

June 13, 2019 @ 8:30 AM

Millennium Hilton New York Downtown | 55 Church Street | New York, NY 10007

Thank you for your interest in this event. We no longer have any spots available.
Please contact linda@consortium.net to be placed on the waiting list. Thank you!

Who Should Attend

Security Managers, Analysts, Incident Responders, and Professionals Interested in Threat Hunting

Training Session Cost

  • Free to attend

Course Overview

During this one-day interactive event, you will be provided with a unique opportunity, where you will be immersed into an interactive one-day security training course. This hands-on course, offered by Consortium Networks, focuses on identifying poor IT hygiene practices that are commonly exploited by attackers to compromise organizations. The course is a combination of lecture and hands-on labs and will cover the following topics:

  • Popular breaches resulting from poor IT hygiene
  • Vulnerability vs. misconfiguration
  • Common host misconfigurations, account misconfigurations, and network misconfigurations
  • Tools for detection and migration

This training will satisfy 7 hours of your Continuing Professional Education (CPEs) towards your CISSP/CIEE continuing education requirements. Training Certificates provided upon request.

  • Registration begins at 8:30 AM
  • This is a seven-hour training course (9:00 AM - 4:00 PM)
  • Light breakfast and lunch will be provided

Other Scheduled Courses

Course 2 is the second class in a 4-part series. Below, you will find the other courses in the series. The dates for these courses will be determined soon.

Course 3
Situational Awareness with Open Source Tools (Intermediate)
Date TBD
Target Audience: Technical Managers, Analysts, Forensic Analysts, and Junior Pen Testers

A deep dive into open source tools and how to use them as part of your security posture. Various tools will be discussed to aid in forensics, hunting, incident response, vulnerability discovery, and situational awareness. Participants of this course will become better equipped to analyze their organization using additional open source tools.

Course 4
Fun with Buffer Overflows (Advanced)
Date TBD
Target Audience: Senior Analysts, Pen Testers, and Application Testers

This is an advanced course to demonstrate the danger of outdated software, specifically those related to BO vulnerabilities. Participants of this class will be introduced to application testing and how to execute BOF attacks against vulnerable software.

About the Trainer - Barry Morgan

CyberSecurity Expert

Barry Morgan is a cybersecurity expert and owner of Hackingbit, LLC., which performs advanced cyber threat simulations, red team/blue team training, and designing remediation strategies to mitigate advanced threats.

Barry has over 20 years of cybersecurity experience and has supported various state and federal government agencies including the United States Air Force, Social Security Administration, Environmental Protection Agency, and the NC Department of Health and Human Services.

Prior to 2014, Barry worked for Computer Sciences Corporation as a security consultant, where he provided a variety of defensive security support services to government agencies. Barry performed malware analysis and cyber forensics for the SSA, intrusion detection monitoring and response for the US Air Force, and vulnerability management for the EPA. Aside from his work as a government contractor, Barry is also a 20-year veteran of the USAF, where still serves as a traditional Guardsman in one of the first cyberwarfare units in the nation.

  About Consortium Networks

Consortium Network's intelligence forum is a group of subject matter experts who share information about the technologies they have deployed to solve complex business security problems. Participants share intelligence on established companies and new start-ups and the emerging risks and problems they solve. As a result, the Consortium maintains lists of technologies and solution providers that can help you address a security breach or incident.

The Consortium is the first organization dedicated to providing real-world feedback and data on tools used in production environments at peer organizations. This data will help improve your security posture by delivering first-hand accounts of how a security problem was addressed by a particular vendor technology. Learn more at www.consortium.net.

  Thank You to Our Sponsors

We would like to thank our event sponsors.


Location that you'll be looking for

Event Location

  • Visit Us
    Millennium Hilton New York Downtown
    55 Church Street
    New York, NY 10007
  • Call Us
  • Questions

Get Directions


Enter Destination From under Get Directions and Click on Get Directions Button.