Post-Exploitation Fundamentals w/ Tyrone E. Wilson
Our discussion of the post-exploitation phase will focus on maintaining access, privilege escalation, domain enumeration, and pivoting.
Now that you have access to a target, what next? Our discussion of the post-exploitation phase will focus on maintaining access, privilege escalation, domain enumeration, and pivoting as we leverage the latest tools and techniques to create a persistent presence in a system.
Tyrone E. Wilson is a seasoned information security professional with a deep-seated passion for enhancing cybersecurity awareness. After 26 years of experience, he has gained valuable knowledge and skills., Tyrone has honed his expertise in computer network defense, penetration testing, vulnerability assessments, cyber threat analysis, training, and incident response.
As the Founder and CEO of Cover6 Solutions, LLC, Tyrone’s dedication extends beyond the boardroom. He’s committed to equipping organizations and individuals with the tools and knowledge they need in information security, penetration testing, and the intricacies of IPv6.
His community involvement is evident as the organizer of The D.C. Cybersecurity Professionals. With a membership exceeding 10,000, it stands as one of the largest cybersecurity meetup groups in the U.S., fostering a space for learning and networking.
Tyrone’s contributions to the field also include roles with BSides NoVA, Howard University, and Hacker Halted. A respected voice in the industry, he has shared his insights at various tech conferences, bridging the gap between knowledge and application in cybersecurity.
Tyrone E. Wilson remains a steadfast advocate for cybersecurity education and collaboration in an ever-evolving digital landscape.
Tyrone E. Wilson
Founder & CEO
CEH Master, eJPT, CySA+, Sec+, Net+
This session will be recorded and a copy of the video will be posted on this page as well as on our YouTube Channel.