Trainor: Peter Kim
Peter Kim has been in the information security industry for the last 15 years and been a penetration tester/red teamer for the last 12 years. During this time he worked for multiple utility companies, Fortune 1000 entertainment companies, government agencies, and the Federal Reserve. He gives back to the security community by teaching penetration testing courses at the community college and creating/maintaining one of the largest security communities in the Southern CA area (meetup.com/LETHAL). He is the best-selling author of three offensive security books, The Hacker Playbook 1, 2& 3. He has also spoken and trained at multiple security conferences including Toorcon, Derbycon, ISSA, OWASP AppSec, LETHAL, and Baythreat.
Email: [email protected]
The days of exploiting MS08-067, encoding with Shikata Ga Nai, and blindly scanning are gone. Both Blackhat hackers and pentesters alike have shifted to using more advanced techniques to bypass AV, implement a smaller footprint to evade SIEM detection, and continually stay persistent to devastate enterprise networks. If you are looking to take your craft to the next level, this is the primer course for you.
This training course was custom developed to put you right in the action and simulate real world red team attacks. You’ll take the approach as a red teamer to social engineer your way into a company, gain information about the network, pivot to valuable resources, and gain access to all the company’s secrets.
This isn’t your average pentest course! We built the labs around what we are seeing as red teamers.
Upon Completion of this training, attendees will know:
Attendees will be provided with (by trainer):
Attendees should bring: