The North Alabama Chapter of the ISSA would like to thank Cricket Liu and Infoblox for attending the November 2015 lunch meeting hosted at Corvid Technologies Auditorium in Huntsville, Alabama. Cricket, who is one of the foremost experts in the proper implementation of DNS, is also a co-author of O'Reilly & Associates Nutshell Handbooks on the Domain Name System, DNS and BIND, DNS on Windows NT, DNS on Windows 2000, DNS on Windows 2003, the DNS & BIND Cookbook, DNS and BIND on IPv6, and was the principal author of Managing Internet Information Services.
The Domain Name System, or DNS, is the Internet's phone book. It's responsible for mapping domain names to IP addresses and other data, and mediates every non-trivial transaction that occurs over the Internet. Because of its criticality, DNS is a target for cyberattacks. We will be discussing the current threats to DNS infrastructure, including DDoS attacks, cache poisoning, malware and DNS tunneling, as well as how to address those threats.
Andy Bryan , a Sr. Security Consultant for VectraNetworks in Sarasota Florida, has worked in the IT Industry for 20 years and has worked in the Information Security vertical specifically for over 15 years with companies like Iron Mountain, Fortinet, Aruba Networks, FireEye. He has also provided consulting services for companies like Aliaswire, TriSixtySecurity, WorkplaceIQ, and iConverse as well as organizations within the State and Local governments. Andy’s career touched on a number of different areas in IT but largely focused on Information Security.
EC-Council will reserve 5 seats in a series of IT Security courses on a first come, first serve basis at the TakeDownCon IT Security Conference in Huntsville, AL July 16 - 19th! Scolarship will also include a complementary pass to TakeDownCon (20-21st) which will feature 16 keynote presentations that will focus on Attack and Defense vectors.
Note: If you are interested in the scholarship, please contact us (see flyer) as soon as possible, because seats are limited and scholarship programs tend to go quickly! Thank you!
This course is 85-90% hands on and utilizes the Kali Linux suite of tools. The course covers in detail various attacks and tools that are contained in the Kali Linux tool suite. Kali Linux is mature, secure, and enterprise-ready for professional pen-testing.
Please bring a 4 Gig thumb drive to class if you would like a copy of your lab exercises.
At this event, speakers will provide a comprehensive overview of the insider threat and advanced Linux threat detection & response solutions Raytheon uses to protect its network. Attendees will learn how Raytheon’s insider threat solution, SureView, enables users to predict possible insider threats and how Raytheon’s Second Look solution is able to analyze volatile memory from Linux systems and advise on where potential indicators of vulnerability exist. Through live product demonstrations and speaker presentations, attendees will better understand industry best practices on how to mitigate the damage of possible insider threats and/or Linux system breaches and the full capabilities of Raytheon’s Second Look and SureView solutions.