About the Pentester Prep Workshop

If you ever wanted to become a penetration tester (Pentester) or if you want to learn offensive techniques to improve your defensive skill set then this workshop is for you. Whether you are new to penetration testing or have zero knowledge this is still the workshop for you. This workshop will guide you on the right path on what it takes to become a successful penetration tester.

This workshop is part of a collection of notes created during our primary instructor’s, Tyrone E. Wilson, time as an inspiring information security professional. For the last four years, Wilson has collected the necessary notes and transcribed successful tools and techniques. Wilson’s passion has always been to help educate others aspiring to also become successful information security practitioners. This Workshop is a small portion of that.

By no means will we be able to address all of the penetration testing topics, tools, techniques and methodologies in the allotted time. As always, it is up to you to perform the additional research and self-study in order continue and maintain a successful understanding of penetration testing. We hope you enjoy all the provided content and look forward to working with you in the future.

The Next Workshop Starts in ..

Day(s)

:

Hour(s)

:

Minute(s)

:

Second(s)

Agenda – Day 1

  • Pentest Lab Setup & Familiarization
  • Pentesting Overview & Methodologies
  • Passive Information Gathering
  • Scanning & Enumeration Techniques
  • Vulnerability Identification & Analysis
  • The Metasploit Framework
  • Threat Modeling
  • Bind Shells vs Reverse Shells
  • Exploitation

Agenda – Day 2

  • IPv6 Overview & Reconnaissance
  • IPv6 Attacks
  • Shellcode Manipulation
  • Antivirus & Firewall Evasion
  • Web Exploitation
  • Post Exploitation
  • Privilege Escalations
  • Password Attacks
  • Capture the Flag(s)

Helpful Links

About the Instructor(s)

Mr. Tyrone E. Wilson is an information security professional with 20 years of experience in information technology and systems configuration, including information systems and network security. Wilson also has extensive knowledge in computer network defense, vulnerability assessments, cyber threat analysis, and incident response. As a former cybersecurity analyst for the United States Army, Wilson developed security structures to ensure American intelligence systems were protected from foreign threats. Currently, Wilson is the Founder and CEO of Cover6 Solutions, LLC; which teaches companies and professionals various aspects of information security, penetration testing, and IPv6.

Wilson is also the organizer of a three cyber security meetup groups. The most popular being a 4100+ person Information Security meetup group called The D.C. Cyber Security Professionals. Founded in 2012, the D.C. Cyber Security Professionals Group’s dedication to providing networking opportunities, informative discussions and educational sessions on all things cyber, has allowed the group to grow strong while providing a real benefit to the cyber community.

Tyrone E. Wilson

Tyrone E. Wilson

Founder & CEO

About the SOC Analyst Prep Workshop

SOC (Security Operations Center) Analysts specialize in identifying and utilizing defensive skills and techniques. With today’s complex technical attacks, SOC Analysts are highly sought after in the Cybersecurity field to mitigate and remedy the damages done by these exploits with the proficient use of tools.This course will feature tools and techniques that defend against the offensive approaches that are taught in our Pentester Prep course.

Both of these courses can be taken with us to better understand the latter of each other. Just like the Pentester Prep course, this is an opportunity suitable for everybody in the Cybersecurity community, whether you are a seasoned professional or a rookie with novice experience.

Our primary instructor, Tyrone E. Wilson, will be going back to his roots to teach this workshop, as the defensive side is where it all began for him. He has collected notes over his years of experience and now would like to give back to the community by sharing his knowledge to successfully demonstrate the use of these tools and defensive techniques.

 

The Next SOC Analyst Workshop Starts in ..

Day(s)

:

Hour(s)

:

Minute(s)

:

Second(s)

Agenda – Day 1

  • SOC Analyst Fundamentals
  • All Source Intelligence Gathering
  • Common Services, Threats, and Attacks
  • Network Mappers & Firewalls
  • IDS/IPS Tools
  • Incident Handling
  • Incident Response
  • Labs Part 1

Agenda – Day 2

  • Wireshark Fundamentals and Memory Forensics
  • Malware Analysis
  • Incident reporting
  • Labs Part 2

Helpful Links

Photo Gallery

Share This