A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:


SecureWV/Hack3rcon 2018 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)

SecureWV/Hack3rcon 2018 Videos

These are the videos of the presentations from Secure West Virginia 2018. Thanks to Justin, Tim, Lacy, Dave, Katie, Kevin, Todd, Alice, Brian, Brandon & Jon for helping record.

Intro/Welcome to SecureWV / Hack3rCon

Keynote - Hackers, Hugs, & Drugs.... Part II
Amanda Berlin

Why The Legal System Needs Your Help
Brian Martin

Mobile devices and you.
Detective Jeremy M. Thompson

The New Age of Ransomware: Cybercriminals Adopt Nation State Techniques
Allan Liska

Talk title to be determined.
Michelle Pirtle
(Not Recorded)

Outside the Box: How the Internet of Things Poses New Cybersecurity Risks and Challenges the Law
Evan Kime

Applying the principles of Dodgeball: A True Underdog Story to CTFs
Branden Miller

Gun Safety Class
Branden Miller

Bash Scripting
Justin Rogosky
(Not Recorded

Python Scripting
Justin Rogosky

Red Hat Enterprise Linux Security Technologies Lab
Lucy Kerner and Roy Williams

Automating Security Operations - on a budget
Jeremy Mio

Security Automation for the Blue Team
Eric Waters

Home Alone: A Pentester Perspective
Craig Vincent & Derek Banks

Simplified Red Hat Enterprise Linux Identity, Authentication, and Authorization management with Microsoft Active Directory and Red Hat Identity Management Trust
Roy Williams

Simple Attribution in Social Media and Websites
Brian Martin

Offensive and Defensive Security with Ansible
Lucy Kerner

High School Competitive Robotics and why you should care.
Charleston Area Robotics Team (CART)

Guaranteed Failure - Awareness The Greatest Cyber Insanity
Joshua Crumbaugh

Developing a Cloud Based Cyber Security Simulation Portal
David Krovich

The Hybrid Home Lab: From Laptop to Cloud
Holden Fenner

Securing your networks with Ansible
Adam Vincent

A deep look at Stack Buffer Overflows and Format String Vulnerabilities
Philip Polstra

Advanced threat hunting with open-source tools and no budget
Joseph DePlato

What's in a Domain Name?
Collin Meadows

Monitoring your home LAN with Python
Zach Tackett

Left of Boom
Ted Corbeill

Your Dead! Now what. How to help your family after your gone.
Steven Truax

A Brief Introduction to Metasploit
Joey Maresca

SecureWV / Hack3rCon Closing / Awards
Benny Karnes

Download videos from:

Printable version of this article

15 most recent posts on Irongeek.com:

If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast