InfoSec Institute Ethical Hacking Certification v10 Bootcamp
Flex Pro Bootcamp facilitated by Keatron Evans of KM Cyber Security LLC
The InfoSec Ethical Hacking v10 Bootcamp goes in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises facilitated by a live instructor with real-world experience. The Flex Pro enhancement provides a variety of tools designed to ensure your success. These tools include but are not limited to pre-course materials, digital courseware, replay system, and access cloud-based labs. Best of all, you can connect with these tools from anywhere, at any time and on your favorite device.
Instructor: Keatron Evans is the Managing Partner at KM Cyber Security, LLC and responsible for global information security consulting business which includes penetration testing, incident response management/consulting, advanced threat hunting services, and training. Keatron is also a Senior Security Advisor at Savvius, and a top-rated instructor for InfoSec Institute and ISACA a global association of 140,000 professionals in 180 countries that helps business and IT leaders maximize value and manage risk related to information and technology. He is also one of the authors of Chained Exploits: Advancing Hacking Attacks from Start to Finish, a textbook still used by U.S. Government Security Agencies.
About: InfoSec Institute, founded in 1998, provides award-winning security awareness and training solutions. They deliver certification-
transform the largest information security risk - your workforce - into your strongest line of defense. You can find out more at http://www.InfoSecInstitute.com.
About: KM Cyber Security LLC has been at the forefront of training and services in the fields of incident response, penetration testing, and digital forensics. They train the top tiers of Certified Ethical Hackers with methods that are grounded in the actual applications of computer networking and cloud services. KM Cyber Security helps leadership understand and manage the cybersecurity risk and provide the technical expertise to put cybersecurity into practice throughout the organization. Their goal is to have in place a process, so the necessary reactions occur before, during and after hacking occurs. Learn more about their services at https://kmcybersecurity.com.
Joseph T. Dager