Andy Bryan , a Sr. Security Consultant for VectraNetworks in Sarasota Florida, has worked in the IT Industry for 20 years and has worked in the Information Security vertical specifically for over 15 years with companies like Iron Mountain, Fortinet, Aruba Networks, FireEye. He has also provided consulting services for companies like Aliaswire, TriSixtySecurity, WorkplaceIQ, and iConverse as well as organizations within the State and Local governments. Andy’s career touched on a number of different areas in IT but largely focused on Information Security.
EC-Council will reserve 5 seats in a series of IT Security courses on a first come, first serve basis at the TakeDownCon IT Security Conference in Huntsville, AL July 16 - 19th! Scolarship will also include a complementary pass to TakeDownCon (20-21st) which will feature 16 keynote presentations that will focus on Attack and Defense vectors.
Note: If you are interested in the scholarship, please contact us (see flyer) as soon as possible, because seats are limited and scholarship programs tend to go quickly! Thank you!
This course is 85-90% hands on and utilizes the Kali Linux suite of tools. The course covers in detail various attacks and tools that are contained in the Kali Linux tool suite. Kali Linux is mature, secure, and enterprise-ready for professional pen-testing.
Please bring a 4 Gig thumb drive to class if you would like a copy of your lab exercises.
At this event, speakers will provide a comprehensive overview of the insider threat and advanced Linux threat detection & response solutions Raytheon uses to protect its network. Attendees will learn how Raytheon’s insider threat solution, SureView, enables users to predict possible insider threats and how Raytheon’s Second Look solution is able to analyze volatile memory from Linux systems and advise on where potential indicators of vulnerability exist. Through live product demonstrations and speaker presentations, attendees will better understand industry best practices on how to mitigate the damage of possible insider threats and/or Linux system breaches and the full capabilities of Raytheon’s Second Look and SureView solutions.