Exploitation Fundamentals w/ Tyrone E. Wilson
Let's discuss the exploitation phase which brings together information from the previous stages in the hacker attack methodology.
Once an analyst has completed the Scanning and Enumeration phase, they must use their results to find vulnerabilities on the target system. Once the vulnerabilities have been found, their associated exploit(s) can be used on the target system. Today we’ll be discussing this exploitation phase which brings together all of the target information we have gathered in the previous stages.
Mr. Tyrone E. Wilson is a passionate information security professional with 26 years of experience in information technology and has a mission to improve as many lives as possible through education in cybersecurity. Wilson also has extensive knowledge in computer network defense, vulnerability assessments, cyber threat analysis, and incident response. Currently, Wilson is the Founder and CEO of Cover6 Solutions, LLC; which teaches companies and professionals various aspects of information security, penetration testing, and IPv6.
Wilson is also the organizer of The D.C. Cyber Security Professionals. With over 9,000 members, it is the largest #Cybersecurity meetup group in the United States. In addition, Wilson is also on the Review Board of BSides NoVA, Howard University, and Hacker Halted and has presented and/or taught classes at many of the major tech conferences.
Tyrone E. Wilson
Founder & CEO
CEH Master, eJPT, CySA+, Sec+, Net+
This session will be recorded and a copy of the video will be posted on this page as well as on our YouTube Channel.