Monthly Events

image4

Build Active Directory: Level 202 (10 slots remain)

IoT Embedded Security Training (17 slots remaining)

IoT Embedded Security Training (17 slots remaining)

TBD due to Coronavirus Uncertainty


New Location 

Covered 6 

868 Patriot Drive Unit 6

 Moorpark, CA 93021


 What  will you learn:   

 Learn Active Directory (AD) from the ground up

Learn the basics of Active Directory administration 

Understand how to properly configure AD & best practices 

If you are new to AD administration, then this class is for you! 

You will learn the basics of Active Directory including DNS, DHCP & GPOs.  Learn how to create users, organizational units & the basics of administrating GPOs.  You will then learn the top 3 things you must do to protect your AD network! 

No Experience Needed! This class is built for those with no to very little AD administration knowledge.  You will learn how to install AD, setup the top 3 policies, all the while learning best practices. 

Best of all this is a “Hands on The Keyboard” class. This is NOT a lecture. This is an ALL-DAY immersive learning experience! You will be provided with your very own Server 2016 & Windows 10 images. You will use these images to build your very own network. You will then be able to take home these images and continue to learn. 

Requirements: 

Windows Laptop with 6GB+ of RAM 

Storage: 80+ GB of storage locally or via USB 

 USB drives with images prebuilt will be available for sale for $45.00 

image5

IoT Embedded Security Training (17 slots remaining)

IoT Embedded Security Training (17 slots remaining)

IoT Embedded Security Training (17 slots remaining)

  TBD due to Coronavirus Uncertainty 


Location

Covered 6

868 Patriot Drive Unit 6

Moorpark, CA 93021


What  will you learn: .  

Author and Trainer: 

Aaron Guzman is a passionate information security professional specializing in IoT, embedded, and automotive security. Mr. Guzman is the Co-Author of “IoT Penetration Testing Cookbook”.

The IoT embedded security training is designed to provide embedded application security best practices, employing proactive controls, testing of embedded IoT systems, and address the challenges of building security into embedded devices. You will learn:

  • How to identify vulnerabilities in medical devices, industrial  control system devices & consumer IoT, 
  • Understand the embedded security testing methodology, techniques, and tools 
  • Identify and apply best practices, as well as techniques for integrating security into the DLC

Course Prerequisites: 

  • Familiarity with  Linux 
  • Administrative privileges with at least 25 GB of HDD and  4 GB RAM 

image6

Phishing

IoT Embedded Security Training (17 slots remaining)

Phishing

May 21st 6pm to 8pm

(Thursday)

 

Location

100% Remote - Zoom Room

 

As more and more companies are reporting breaches, the need to understand the methods that attackers use to lure our employees is needed.  Simulated phishing exercises recreate the same circumstances when a phishing email gets through all our layers of protection.  The goal of any awareness program is to change behavior to:


  • Create and nurture a culture of cyber security at your workplace.
  • Communicate the correct security behavior.
  • Improve awareness and adherence to corporate policies and practices.
  • Strengthen the human element of security risk.

In this presentation we will discuss the following topics:


  • How to choose the right tool for the job.
  • What considerations need to be made when selecting a tool and running a campaign.
  • What does an active simulation look like.
  • What do you do with the results.

In addition, I want to share some industry standards and successes when dealing with these features on a global scale in a multi-tiered enterprise environment where each business unit has potentially 10's of thousands of users and leadership stakes are high.

image7

.

.

.






image8

.

.

.

.