Workshop 1: Technical Versatility in Cybersecurity

  • Date 07 Jun 2018

    Register Now

Workshop 1: Technical Versatility in Cybersecurity

07 Jun 2018, 10:00 - 12:00

Security Workshops
Language:
English

Gain an insight into the vast array of technical knowledge required by a technical Cybersecurity practitioner. Attendees will be led through four interactive online labs that cover packet analysis, malware analysis, file forensics, and browser exploitation.

Learning Outcomes:

  1. Gain an insight into the vast array of technical knowledge required by a technical cybersecurity practitioner as well as the benefit of performance based hands-on training
  2. Packet Analysis - Utilising Wireshark and DNS to build a narrative on a clients activities on the network
  3. Malware Analysis - Conducting simple static and dynamic analysis on a nefarious binary file
  4. File Forensics - Recovering information from a mobile platform
  5. Browser Exploitation - Demonstrating the simplicity of browser attacks using open source software in Kali Linux

Target audience: Mid-level Information Security Management

Please note: Registering your interest does not confirm entry to session. You will receive an email to let you know whether you have a place on the workshop

The Security Workshops are located on Level 3 of the Olympia Conference Centre. To access the conference centre, please use the signposted entrance on Hammersmith Road. This is a different location to previous years so make sure you plan ahead.

**Please note: You cannot access the Olympia Conference Centre via the main Infosecurity Europe exhibition hall – you must use the Hammersmith Road entrance. Please allow extra time for this.

Contributors

  • Dustin Brewer

    Speaker

    Manager Cybersecurity Technical Content

    ISACA

    Over 14 years of experience in the IT field beginning with small business networks, programming, and hardware specialization. While serving in the...

1. Deliver security to drive and enable business growth 2. Understand internal and external threats and keep a business secure

Sponsors

ISACA

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.