| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Piercing Your Perimeter, Dodging Detection, and Other Mayhem! a.k.a. Pen Tester Voodoo 101 Tech1 - Session #8 - Mick Douglas
How is it that penetration testers are able to routinely successfully attack networks for clients? This talk will show the techniques and tools pen testers use to gain access to your network. More importantly, attendees will learn actual defensive techniques that really work to counteract these attacks. Bio:
Even when his job title indicated otherwise, Mick Douglas has been doing information security work for over ten years. He has received a bachelor's degree in Communications from the Ohio State University and holds the CISSP, GCIH, GPEN, GCUX, GWEB, and GSNA certifications.
Prior to joining Black Hills InfoSec, Mick has done computer and network security in a variety of industries including: academia, telecommunications, banking, and insurance.
He is always excited for the opportunity to share with others so they do not have to learn the hard way! When he's not "geeking out" you'll likely find him indulging in one of his numerous hobbies; photography, scuba diving, or hanging around in the great outdoors.
VideoGoesHere
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast