Exploitation Fundamentals w/ Tyrone E. Wilson
Let's discuss the exploitation phase which brings together information from the previous stages in the hacker attack methodology.
Once an analyst has completed the Scanning and Enumeration phase, they must use their results to find vulnerabilities in the target system. Once the vulnerabilities have been found, their associated exploit(s) can be used on the target system. Today we’ll be discussing this exploitation phase which brings together all of the target information we have gathered in the previous stages.
Tyrone E. Wilson is a seasoned information security professional with a deep-seated passion for enhancing cybersecurity awareness. After 26 years of experience, he has gained valuable knowledge and skills., Tyrone has honed his expertise in computer network defense, penetration testing, vulnerability assessments, cyber threat analysis, training, and incident response.
As the Founder and CEO of Cover6 Solutions, LLC, Tyrone’s dedication extends beyond the boardroom. He’s committed to equipping organizations and individuals with the tools and knowledge they need in information security, penetration testing, and the intricacies of IPv6.
His community involvement is evident as the organizer of The D.C. Cybersecurity Professionals. With a membership exceeding 10,000, it stands as one of the largest cybersecurity meetup groups in the U.S., fostering a space for learning and networking.
Tyrone’s contributions to the field also include roles with BSides NoVA, Howard University, and Hacker Halted. A respected voice in the industry, he has shared his insights at various tech conferences, bridging the gap between knowledge and application in cybersecurity.
Tyrone E. Wilson remains a steadfast advocate for cybersecurity education and collaboration in an ever-evolving digital landscape.
Tyrone E. Wilson
Founder & CEO
CEH Master, eJPT, CySA+, Sec+, Net+
This session will be recorded and a copy of the video will be posted on this page as well as on our YouTube Channel.