Hands on approach to network penetration testing. This workshop is designed for persons with little to no experience with network penetration testing. We will be demonstrating an industry standard approach to performing a network penetration test with an emphasis on the fundamentals, the tools utilized, the methodologies implemented, and exploitation of identified vulnerabilities. Basically start to finish ultimate pwn’age.
Registrants must bring a laptop with working kali Linux virtual machine and a minimum of 25ft Ethernet cable.
Key Learning Points
#1 Fundamental pentest methodology
#2 Toolset utilization
#3 Pentesting tips and tricks
Presentation Level: Basic
About Bradley Ammerman and Tyler Burban
Bradley Ammerman is a security consultant with the Optiv Security’s Attack and Penetration team. Prior to joining Optiv Security he was employed as a Cyber Intelligence Analyst for Lockheed Martin. He has worked in Information Technology since 2001, where he gained experience with Network & Information Assurance (IA), cyber security engineering, penetration testing, vulnerability assessments, reverse engineering, and exploit development.
Bradley currently holds a number of professionally accredited certifications including: OSCE, OSCP, CISSP, C|EH, Security+, MCP, and GIAC GREM certifications. Bradley also holds a US Secret level government clearance.
Tyler Burban is a PCI analyst at Rapid 7. Prior to joining Rapid 7 he spent six years working various roles and with countless technologies for a Minnesota based telecom; tier 1&2 help desk, managed network support, IPTV distribution, network operations technician, network security engineer. Due to this employment history Tyler has had experience with small single user networks to large complex national networks giving him a unique perspective on network security.
Tyler graduated from Minnesota State University, Mankato with a B.S. in Information Technology and holds the OSCP certification from Offensive Security. He is a member of IEEE and InfraGard and volunteers at many known security conferences.