Courses
Defensive Security and Cyber Risk
In this course, you will learn the basics of defensive security and cyber risk. You will review foundational risk management concepts such as calculating risk and strategies for dealing with risk. You will also explore the NIST CSF as a framework for understanding defensive security.
Careers In Cybersecurity
Lateral Movement: Remote Desktop Protocol (RDP)
Valid Accounts: Local Accounts
Protocol Tunneling
Exfiltration Over Alternative Protocol: Asymmetric Encrypted Non-C2 Protocol
Lateral Movement: Windows Remote Management
Application Layer Protocol for C2 and Exfil to Cloud
Unsecured Credentials and Domain Accounts
Disable Windows Event Log and Timestomp
Compromise Software Supply Chain
Ransomware with Recovery Disruption
After too many years of security operations work, Chris Daywalt tries to turn his phone off at 5:00 pm EST. While there are a bunch of training classes and education somewhere on his resume, much of what he has to teach was learned at the school of hard knocks, often at the expense of his previous clients. He wants to help you spend more time detecting and denying adversaries and less time banging your head against your keyboard. He dips his blueberry donuts in orange juice.
Chris’ 19-year career includes work for organizations of all sizes, both government and private sector, and is distributed roughly like so: