This Year’s Training: Better, Richer, and Cheaper if You Act Now
Black Hat is just around the corner, and Coalfire is gearing up for the best Adaptive Penetration Testing Training yet! We’ve ‘adapted’ the Adaptive Penetration Test Training course with new instructors, enriched content, and new labs to provide the richest training to date. The revised training now includes exploitation and post-exploitation for Linux as well as an after-hours bonus, Social Engineering “practical” exercises. Demand has been high – we’ve sold out the July 22-23 class, but we’ve got just a few seats left for our July 24-25 class. Save $100 on those last seats if you register before the 21st!
Our trainers for this year are some of the best talent the industry has to offer:
Dan McInerney runs a top 100 Python Github account with dozens of original security tools. He has been featured on PaulDotCom's Security Weekly podcast in a technical segment on automating penetration testing tasks with Python. He was also named one of the "35 Awesome InfoSec Influencers You Need to Follow." Dan possesses a love of the cutting edge and is currently researching the use of machine learning for vulnerability hunting.
Michael Allen "Wh1t3Rh1n0" is one of Coalfire's premiere Red Team and adversary simulation specialists. In addition to holding the OSCE, he is one of only a handful of certified Master Level Social Engineers in the world. He was recognized during the MLSE course as a leader in impersonation and intelligence-gathering techniques. Michael's client work has taken him from United States military bases to Fortune 50 companies, tech start-ups, government institutions, and healthcare providers. He is also the creator of Air-Hammer, a tool designed to leverage open source intelligence in attacks against wireless networks.
Marcello Salvati, a penetration tester at Coalfire, specializes in vulnerability weaponization, scripting/software development and internal network penetration testing with a focus on Windows/Active Directory environments. He is a passionate and active member of the InfoSec community who runs one of the top 300 Python github accounts worldwide. He has created and contributed to numerous open-source tools including MITMF, DeathStar, and CrackMapExec, and has presented on their use at security conferences such as Defcon, BlackHat, 44Con and DerbyCon.
Ryan MacDougall's areas of expertise include network penetration testing, application security, protocol analysis and social engineering. Ryan began his career in operations, building and securing large networks for financial and telecommunications industries, including a global network spanning six countries, consisting of three data centers and eight regional offices. In his 10 years running operations in a company that grew through M&A activities, acquiring, integrating, and standardizing operations, he developed a deep understanding and insight into fundamental flaws present in a wide variety of enterprise environments. Ryan has his OSCP, GWAPT, SEPP and MLSE certifications.
Ryan Jones will be there as well, offering insights into the world of physical security. And if you’re lucky, you might catch of Mike Weber accompanying the group on a ukulele or just running errands for the Smart Guys in the room.
In addition to the training, our own Marcello Salvati will be demonstrating his utility, CrackMapExec v4, in the Arsenal track on Thursday the 27th at 10:00 a.m. He will highlight all the changes in the freshly minted 4.0 release – described here. And don’t miss his bio – one of the best bios ever written in the history of bio-writing.
REGISTER FOR THE TRAINING RIGHT NOW!