BSides Jacksonville 2024 Pre-Conference Workshops
All workshops are held on Friday, Nov 15th, at UNF and require pre-registration.
Register For Pre-Conference Workshops Here
Friday, November 15th 2024
Time | Workshop 1 | Workshop 2 | Workshop 3 | Workshop 4 |
---|---|---|---|---|
09:00-10:00 | Landing Your First InfoSec Job - Jobs, Resume Prep, Interviewing | Active Directory, Powershell, Blue and Red Team | Professionally Evil API Security | |
10:00-11:00 | Incident Response in Action: An Interactive Discussion on Common Cybersecurity Scenarios | |||
11:00-12:00 | ||||
12:00-13:00 | Break - Lunch | |||
13:00-14:00 | Landing Your First InfoSec Job - Jobs, Resume Prep, Interviewing | Active Directory, Powershell, Blue and Red Team | Professionally Evil API Security | |
14:00-15:00 | ||||
15:00-16:00 | Incident Response in Action: An Interactive Discussion on Common Cybersecurity Scenarios | |||
16:00-17:00 |
Workshops
Landing Your First InfoSec Job - Jobs, Resume Prep, Interviewing |
A working session/presentation on how to land your first job in infosec Currently a cybersecurity manager with nearly 30 years of experience in IT and Information Security roles. Holds or has held more than a dozen certifications and has trained thousands of people on a variety of topics. His greatest achievements are in helping others change their lives through new careers or elevating their career to a new height. Time: 9:00am - 5:00pm Cost: $125 |
Active Directory, Powershell, Blue and Red Team |
Active Directory is a Monolith. Powershell is insanely powerful. Together they can be used to hunt for threats and test those systems. Join Michael Marbut and Eric Kuehn for a hands-on workshop where we will dive into both red team and blue team sides of Active Directory utilizing Powershell. Time: 9:00am - 5:00pm Cost: $200 |
Professionally Evil API Security |
If you want to learn how to perform security testing on web applications that use application programming interfaces (APIs), this course is for you. APIs are the connective tissue responsible for transferring information between systems, both internally and externally. They are also a common target for cyberattacks, as they can expose sensitive data, application logic, and internal infrastructure. In this course, you will learn the basics of API penetration testing, including: What is an API and how it works What are the common types of APIs (SOAP and REST) and their differences What are some of the most common security risks and vulnerabilities of APIs How to use tools and techniques to test APIs for security issues By the end of this course, you will be able to conduct a basic API pen test using a systematic approach and industry best practices. You will also gain hands-on experience with popular tools such as Postman, Burp Suite, Nmap, and OWASP ZAP. This course is suitable for beginners who have some knowledge of web application security and want to expand their skills to API security testing. Jennifer is a Senior Security Consultant with Secure Ideas with a background in malware analysis, penetration testing, and teaching. She graduated with honors from Florida State College at Jacksonville’s networking program. An avid computer geek for most of her life, she began her journey in cybersecurity as a SOC Analyst where she showed an aptitude for both penetration testing and malware analysis. She was quickly promoted into a role that capitalized on her abilities. She has experience performing penetration tests against web applications, mobile software and platforms, and social engineering. Jennifer discovered a passion for computers and problem solving at a young age. She bought Steal This Computer Book 2.0, by Wallace Wang, with one of her first paychecks, and became enamored with hacking and cyber security. While pursuing her degree she dedicated time to teaching computing skills to underrepresented minorities. She is the co-leader for the TOOOL chapter in Jacksonville, FL. Jennifer continues to be passionate about teaching and is eager to share her knowledge with anyone who will listen. In her free time, she likes gaming, playing around with SDR’s, and painting. Time: 9:00am - 5:00pm Cost: $200 |
Incident Response in Action: An Interactive Discussion on Common Cybersecurity Scenarios |
Scenario A: Adware with a Side of C2 Time: 10:00am - 12:00pm Cost: $50 |
Scenario B: Dual-Approval > Dueling with Wire Fraud Scams Time: 3:00pm - 5:00pm Cost: $50 |