This single sentence document provides a verified certificate number that can be accessed online at the given URL www.credential.net/10201480. The certificate provides credentialing for an individual.
The Shoulders of InfoSec Project by Jack DanielEC-Council
“If I have seen further it is by standing on the shoulders of giants.”
Most famously attributed to Sir Isaac Newton, this quote reflects the sentiment of the Shoulders of InfoSec Project and this presentation.
All of us in the field of information security stand on the shoulders of giants, this presentation is dedicated to shining a light on those shoulders- the known and unknown. From pioneers in the field to founders of the industry and even significant members of the hacker community, this talk will bring perspective to the people and ideas which shape the modern security landscape.
The Shoulders of InfoSec Project by Jack DanielEC-Council
“If I have seen further it is by standing on the shoulders of giants.”
Most famously attributed to Sir Isaac Newton, this quote reflects the sentiment of the Shoulders of InfoSec Project and this presentation.
All of us in the field of information security stand on the shoulders of giants, this presentation is dedicated to shining a light on those shoulders- the known and unknown. From pioneers in the field to founders of the industry and even significant members of the hacker community, this talk will bring perspective to the people and ideas which shape the modern security landscape.
Out Go The Lights: An enlightening discussion of IoT automation security By D...EC-Council
Regularly we see the Internet of Things (IoT) automated lighting solutions being overlooked when it comes to security. Often this is facilitated by statements such as “it’s a light bulb what is the worse they can do, turn my lights out”. In this presentation we will have an in-depth discussion on IoT lighting automation ecosystem security. Discussing topics including: The security implications of lighting automations vulnerabilities, the impact of migrating insecure IoT technologies into the enterprise work place, and what are the best practices we can leverage to reduce the risk and impact of these technologies within our enterprise environments.
Lateral Movement: How attackers quietly traverse your NetworkEC-Council
After successfully attacking an endpoint and gaining a foothold there, sophisticated attackers know that to get to the valuable data within an organization they must quietly pivot. From reconnaissance to escalation of privileges to stealing credentials, learn about the tactics and tools that attackers are using today.