Courses

Kerberoasting and Domain Accounts

Application Shimming and Data from Local System

Spearphishing Attachment and PowerShell
Phishing is one of the top techniques leveraged in breaches today, and adversaries use it to send malicious attachments to targeted users. PowerShell is a powerful scripting tool that adversaries can exploit to perform recon and run executables. You will detect these adversary techniques and discover ways to mitigate them.

Exfiltration Over C2 Channel
This hands-on lab covers the Mitre TTP T1041- Exfiltration Over C2 channel, which involves exfiltrating data over a command and control (C2) channel. This technique is commonly used by threat actors to evade detection and exfiltrate sensitive information from compromised networks.

Ingress Tool Transfer
This hands-on lab provides a brief survey of the MITRE TTP T1105 technique. This technique involves using tools to transfer malicious files onto a target network and the techniques used to evade detection.

Exploit Public-Facing Application

Search Open Technical Databases: Scan Databases

Careers In Cybersecurity
Owen is certified in the GIAC GSEC, CompTIA CySA+, and various other vendor-related certifications. He works both as a technical security engineer and as an SME architect instructor in his spare time. Spreading the word of cyber security is a passion of his. Owen lives in Southeast Michigan with his beautiful wife, daughter, and his dog, Thor. In his free time, Owen enjoys watching sports and movies, and spending time with his family.
