IT Admins who are interested in cybersecurity, Ethical Hackers, Pen Testers
EC-Council’s Mobile Security Toolkit (Better known as the STORM!) is a fully-loaded pen-test platform which comes equipped with a customized distro of Kali loaded onto a portable Raspberry Pi-based touchscreen device.
EC-Council rolled out the STORM as a mobile tool to enhance our certification course offerings by giving online asynchronous students a mobile training option. In this option, the video lectures are loaded directly onto the STORM.
ISSA Metro in Atlanta came to EC-Council and asked if we could teach a course on the STORM. The answer of course was resounding, “YES!” and the Mobile Security Tool Kit – Ethical Hacking Workshop was born.
The course content was derived by pulling carefully selected modules from EC-Council’s Certified Network Defender (CND) and Certified Ethical Hacker (CEH) certification courses.
“I really enjoyed the class, thanks for working with the chapter to get this delivered to the group. Hope we can do something similar next year.”
“The class was a smashing success. In January we should have you talk to the ISSA Board and see how we do more.”
BSides Tampa is an Information Technology security conference hosted by the Tampa Bay chapter of (ISC)2, a registered 501 (c)3 non-profit organization. The BSides Tampa conference focuses on providing attendees with the latest in information security research, development and exploits. The conference is hosted yearly in Tampa and features various presentations and demonstrations from the best minds in industry and academia.
Kevin Cardwell served as the leader of a 5 person DoD Red Team that achieved a 100% success rate at compromising systems and networks for six straight years. He has conducted over 500 security assessments across the globe. His expertise is in finding weaknesses and determining ways clients can mitigate or limit the impact of these weaknesses.
He spent 22 years in the U.S. Navy. He has worked as both software and systems engineer on a variety of Department of Defense projects and early on was chosen as a member of the project to bring Internet access to ships at sea. Following this highly successful project he was selected to head the team that built a Network Operations and Security Center (NOSC) that provided services to the commands ashore and ships at sea in the Norwegian Sea and Atlantic Ocean . He served as the Leading Chief of Information Security at the NOC for six years. While there he created a Strategy and Training plan for the development of an expert team that took personnel with little or no experience and built them into expert team members for manning of the NOSC.