While there are overlapping skills, there are differences that will be discussed as Phillip Wylie shares his experience of going from a pentester to a red teamer.
Cybersecurity Blog | Cover6 Solutions
The Cover6 Solutions' blog provides the latest information security news and hands-on cybersecurity tutorials from seasoned professionals.
Chris Pedigo, the CTO of Lacework and cloud aficionado covers the importance of visibility, baselining, and anomaly detection in ensuring the safety and compliance of cloud & containerized environments.
Join Mark Danner to hear how CIA methods of target assessment and AI tools can be leveraged to spot those individuals in most vulnerable to hacker attacks.
We will discuss some of the prospects and challenges of the major pathways for a successful cybersecurity career.
Filipi Pires demonstrates how to integrate malware analysis using sandbox techniques (dynamic analysis) to automate the analysis of malicious code.
We will learn how to setup Security Onion at home or on an enterprise network and use its features to complete various network defense challenges.
When we talk about election security, most people think of hacking voting machines. But what about other cyber methods and means of disrupting an election?
Learn how attackers use Open Source Intelligence (OSINT) and third-party apps to obtain information that eventually leads to a successful corporate or home network compromise.
This is a quick talk on how to set up your attack machine, your practice environment, and helpful resources and tools that will help you prepare for and pass the major offensive practical exams. These exams include the eJPT, CEH Practical, the OSCP and many more. Let’s roll.
Have you ever watched an asset get infected a was unable to respond? This is probably one of the worst feelings as a security analyst. This might have been due to the approvals, tickets, or process needed for action. Nevertheless, these kinds of situations can be avoided with SOAR.
MITRE ATT&CK seems to be the “next big thing”. Every time I hear about it I can’t help but wonder, “how do you prevent all these attacks in the first place? Shouldn’t that be the end game?”
Interested in a successful career in cybersecurity? Learn what it takes from seasoned professionals who provide advice on how to make that happen.