12 December 2018
Register Now for a Career Foundation in Data Science!Join Joshua Saxe, Chief Data Scientist at Sophos and author of “Malware Data Science”, for an exploration of AI for the visual learner. Yes... there will be code, tools and advanced mathematics, but Josh has a way of presenting these highly technical topics in a way that is easy, fun and memorable. Get valuable career advice and catch up on years of Cyber Security AI knowledge in this FREE EH-Net Live! webinar on Thursday December 20, 2018 at 1:00 PM US Eastern. Join us live to receive certificates for easy submission of CPEs!
4 December 2018
See the SOC of Tomorrow and How to Survive It!
Video and Slide Deck from EH-Net Live! Nov 2018We've all heard the stories of millions of available jobs in InfoSec that go unfilled because of a lack of qualified applicants. Our guest can attest to this not only in his own organization but also those he serves. And even though offensive jobs are sexy and fun, the vast majority of jobs are defensive in focus. Just think of all of the positions on-prem and in the cloud dedicated to infrastructure, endpoint security, log management, MFA, DLP, help desk and the list goes on and on. Now compare that to the number of pen testers out there. Blue team members dwarf red teamers. And, although companies would love to hire humans, doesn't it make sense for them to at least look at AI as a solution to the skills gap?
13 November 2018
Register Now to See the SOC of Tomorrow and How to Survive It!Peter Schawacker whips SOCs into shape with Security Automation and Orchestration (SOAR), SIEM Analytics, Big Data, Vulnerability Management and a healthy amount of AI for Deloitte customers. He'll show you the evolution of the SOC and the skills you need to stay relevant during this career saving presentation for Blue Team members in this FREE EH-Net Live! webinar on Thursday November 29, 2018 at 1:00 PM US Eastern. Join us live and you might just get hired by Deloitte!
29 October 2018
Video and Slide Deck from EH-Net Live! Oct 2018Follow the money. Be it business, politics or crime, this is a common method of trying to find out who's involved and their motivations. In the world of cyber crime, bad actors use cryptocurrencies for the innate security of the blockchain and the supposed anonymity that comes with it. But as with any investigation, if you look hard enough, there's always breadcrumbs left behind. Somehow, someway, there's always a paper/electronic trail back to a human in the real world. Join Nick Furneaux, author of “Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence”, for an eye-opening presentation with live demos on how to break through the wall and get to the data your investigation needs. Use Code: Cry20 for a 20% discount on Nick's book on Wiley's site. Code expires on December 31, 2019.
9 October 2018
Register Now to Learn Blockchain Hacking Step-by-Step!Nick Furneaux, forensics trainer, investigator & author of "Investigating Cryptocurrencies" takes you through a journey of code and tools to unpick the movement of illegal funds through the blockchain during this fascinating, FREE EH-Net Live! webinar on Wednesday October 24, 2018 at 1:00 PM US Eastern. Join us live to learn how to win free copies of his book!
3 October 2018
Video and Slide DeckEH-Net Live! - Basics of IoT Hacking - Watch Full Webinar from EH-Net Live! Sept 2018 IoT is not only a hot buzzword, but the sheer number of devices shows that it’s living up to the hype. The benefits can be a game changer for any organization. But at the pace with which the technology is being adopted, we as security professionals know all too well what happens when speed to market is the highest priority. As Trinity said, “You have been down there, Neo. You know that road. You know exactly where it ends. And I know that's not where you want to be.” On the other hand, this gives us a huge opportunity in the field of IoT security research and bug hunting. IoT devices are beautiful not only because of their capabilities in such a small package, but also because they are a wonderful merging of several technologies. But with each new added feature, the attack surface gets that much bigger. And anywhere there’s a way in for an attacker, there’s also a paying gig for a security professional… before, during and after a product is released. Join the experts from Independent Security Evaluators (ISE), the people that bring you IoT Village at DEF CON, DerbyCon, RSA and many others, as they guide you through the inner workings of this great field of ethical hacking with a live demo, discussing career paths, and additional resources to keep you educated in this rapidly changing industry. From those in the maker movement to InfoSec professionals, IoT hacking isn’t just a fun skill, but a lucrative one!
9 September 2018
Register Now and Learn IoT Hacking Step-by-Step! Join Jacob Holcomb (AKA Gimppy) of SOHOpelessly Broken fame & principal researcher for Independent Security Evaluators (ISE), the people behind the IoT Villages of DEF CON, RSA, DerbyCon and more, for live demos of hacking IoT devices, the methodology for repeatable success and career opportunities for those with IoT Hacking skills during a […]
21 August 2018
Video and Slide Deck from EH-Net Live! Aug 2018 The world of social engineering is a vast one. Probably more so than you might imagine. But to most, it can seem like a strange and mysterious place filled with the wonders of the human brain, trickery of the mind and all sorts of non-technical wizardry. You’ll need a wise and […]
30 July 2018
16 July 2018
Video and Slide Deck from EH-Net Live! July 2018 When most think of selling bugs, they have visions of the underground hacking scene populated by nefarious characters using their 0-days for illegal activity. But what if you could get in on the bug hunting action without the worry of law enforcement? You can now! Companies not only use 3rd party […]