Attack-Detect-Defend (ADD) w/ Kent Ickler and Jordan Drysdale
June 20 @ 9:00 am – June 21 @ 6:00 pm EDT
Instructor: Kent Ickler and Jordan Drysdale
Course Length: 16 Hours
Includes: Twelve months of complimentary access to the Antisyphon Cyber Range, certificate of participation, six months access to class recordings.
Class Dates | Class Times |
---|---|
Thursday, June 20, 2024: | 9:00 AM-6:00 PM* |
Friday, June 21, 2024: | 10:00 AM-6:00 PM |
This class is part of the Incident Response Summit. Registration for any Incident Response Summit class includes registration for the summit and all of its presentations, talks, and streams.
Clicking on the button above will take you
to our registration page on the website.
Course Description
This course will deep dive into what we call threat optics: auditing endpoints, centralizing logs, and visualizing results. Each student will leave the class having experienced a penetration test through three distinct perspectives, each building on the previous. This will be done by performing a series common adversarial attacks (the Red Team) followed by an examination of defensive postures, and wrapped up with various detection methodologies using open-source or free industry threat detection and defenses (the Blue Team).
Trainer & Author
Jordan Drysdale
Jordan was around for the inception of Napster and the explosion of P2P networks. This drove his fascination with network systems and led him toward a career in IT. Jordan’s first gig in the industry included supporting Latin American networking customers for Hewlett Packard’s network support division. After five years of support, engineering, training, and stress, Jordan became a wireless escalations team lead and multi-vendor certified problem solver. With kids in tow, Jordan headed back toward the Dakotas to be nearer extended family and friends where he learned Citrix, VMware, VDI, supported Cisco gear, implemented profile management solutions, deployed remote networks at scale, and ensured performance across infrastructure. Before becoming a penetration tester, Jordan supported multiple (50+) domains as part of an MSSP’s rock star team. For the last five years, Jordan has been a penetration tester with the Black Hills InfoSec team.
Kent Ickler
Kent started his Information Technology career working for an Internet Service Provider supporting the MidWest’s broadband initiatives of the early 2000s. His interest in technology and business operations drove his career into working for multiple Fortune 500 companies and equipping their organizational leadership with business analytical data that would support their technology initiatives. With an understanding of Information Technology, System Administration, Accounting, and Business Law, Kent has helped businesses leverage technology for competitive advantage while balancing the risks associated with today’s dynamic network environments. Kent has been with Black Hills Information Security for three years in security and administration roles.
In addition to their Security Analyst roles at Black Hills Information Security, Jordan and Kent are Co-Founders of Defensive Origins…a cyber-security research, training, and consulting institution designed to assist Information Security professionals, Systems Administrators, and Organizational Leadership in developing, operating, and maintaining efficient secure network operations. Both Jordan and Kent have presented at multiple conferences, webcasts, and television programs, as well as written blogs discussing the importance of Network Security, Internet Privacy, and the importance of balancing Information Security business risk in today’s organizations.