| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
This talk outlines some common red team tactics as well as some of the defensive countermeasures for them. Boring, right? Wrong, because it doesn't stop there! We will also go over some of the more sneaky, but still simple, red team strategies for countering the defensive counters. Its like 'counter-inception'. Attendees will leave this talk with an understanding of defensive techniques used to mitigate common attacks, as well as offensive tricks to increase the success of the same attacks.
Jeff has been working in IT for about eight years with a focus on security for the past five. He enjoys performing offensive services as well as helping others learn and grow through training and mentoring. He is currently working as an Associate Principal Consultant at SecureState, and does not enjoy writing about himself in the third person.
Tom's background began in Systems Administration before moving over to Information Security in 2014. Since then he's focused on ways to help defend networks and systems from threats, while trying to increase his own offensive skillsets. He is currently working as a Senior Consultant at SecureState.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast