Joseph McCray

Courses by Joseph McCray

Posts by Joseph McCray

Ultimate Defensive Cyber Bundle – log analysis, malware analysis, and packet analysis

There is just no getting around it. If you really want to be able to protect today’s networks you’ve gotta be a defensive cyber analysis guru. That means you’ve got to know log analysis, malware analysis, and packet analysis.

Don’t worry buddy – I’ve got EXACTLY what you need. It’s a 3-day course that is 100% hands-on. That means….

ABSOLUTELY NO DEATH BY POWERPOINT!!!!!

This class is all labs, real logs, and live malware.
log analysis, malware analysis, packet analysis

All you need is a Linux virtual machine for this class. You can use Kali Linux, or any modern Linux distribution or you can download my Linux virtual machine from here:
https://s3.amazonaws.com/infosecaddictsvirtualmachines/Ubuntu-17-10-InfoSecAddictsVM.zip
user: infosecaddicts
pass: infosecaddicts

If you are worried that you aren’t strong enough in Linux for and you want to prepare for this class you can watch and do the following videos before the start of the class on Monday:
https://www.youtube.com/playlist?list=PL6gx4Cwl9DGCkg2uj3PxUWhMDuTw3VKjM

Students will receive

  • 40 hours of CPEs (certificate of completion upon sending in class homework)
  • Linux virtual machines
  • Lab manual

Videos

Each class will be recorded and made available to the students via email. So you can keep up with the class even if you have to miss time, or even a whole day.

Support

Students can request help via email based trouble ticketing system (allow 24 hours for a response). Just send an email to [email protected] with any issues or concerns that you may have.

Schedule

  • Monday 9th April (6:00 pm EST – 10:00 pm EST)
  • Wednesday 11th April (6:00 pm EST – 10:00 pm EST)

Course Cost

This course bundle cost $100 for access

$100.00Select options

Ultimate hacklab – prep for hacking challenge lab exams like OSCP, LPT, eCPPT

Ultimate hacklab – prep for hacking challenge lab exams like OSCP, LPT, eCPPT, and soon even the new CEH is going to be a hacking challenge lab as well.

If you really want to know what it takes to pass hack lab challenge-based exams like OSCP, LPT, eCPPT then ultimate hacklab is for you.

The InfoSec Addicts ultimate hacklab is best way for you to practice the skills required for almost any hands-on lab based penetration testing/ethical hacking certification.

The ultimate hacklab gives you the opportunity to follow along with a structured and very detailed training program, and/or make your way through the labs and just ask for help whenever you get stuck. You can run almost any tool and try almost attack in the environment.

You can connect to the lab environment with almost any platform (Windows, Mac OS X, Kali Linux, other Linux distros).

Class syllabus:

  • Module 1: Connecting via VPN to the lab network
    • Connecting to the VPN with Windows
    • Connecting to the VPN with Mac OS X
    • Connecting to the VPN with Linux
    • Connecting to the VPN with Kali
  • Module 2: Scanning
    • Nmap
    • Net-Discover
  • Module 3: Module X: Enumeration
    • nmap NSE
    • rpcinfo/showmount
    • nbtstat
    • enum4linux
  • Module 4: Brute-forcing
    • Hydra
    • Medussa
  • Module 5: Vulnerability Scanning
    • Nessus
    • OpenVas
  • Module 6: Attacking web servers/web apps
    • Manual XSS/SQL Injection/LFI/RFI
    • Nikto
    • Dirbuster
    • Burp Suite
    • w3af
    • Arachni
  • Module 7: Compiling/Modifying Exploit code
    • Compiling code in Windows
    • Compiling code in Linux
    • Finding offsets
    • Changing out shellcode
  • Module 8: Client-Side Exploitation
    • Metasploit
    • Social Engineering Toolkit
  • Module 9: Transferring files
    • FTP
    • TFTP
    • VBscript
    • Debug,exe
    • wget/linux/bitsadmin
    • PowerShell
  • Module 10: Privilege Escalation
    • Linux
      • SUID binaries
      • Shell escapes
    • Windows
      • Identifying vulnerable services/misconfigurations
      • beR00t.exe
  • Module 11: Data-mining a compromised host
  • Module 12: Hashcracking
  • Module 13: Pivoting
    • Netcat/Socat pivot
    • SSH Pivot
    • Metasploit pivot
  • Module 14: Lateral movement
    • psexec
    • smbexec
    • winexe
  • Module 15: Data Exfiltration
    • ICMP Tunneling
    • DNS Tunneling
  • Module 16: Reporting

 

Lab Network Access

Targets in the lab network will change on the 1st of every month. Students have the option to purchase 3 months access to the lab environment.

 

Training Sessions and Final Mission:

Track 1: Monday (23 April) to Friday (25 April) from 9am EST to 3pm EST each day.

Track 2: Saturdays in the month of May, but students are given the entire month of May for the final mission.

Students will attack the servers and workstations in a different lab environment than the April training environment. These servers are much harder to penetrate than standard servers in the typical production environment. Similarly, these vulnerabilities are difficult to exploit (on purpose).

 

Students will receive

  • Up to 124 hours of CPEs (24 CPE for the actual training and the rest come from labs and challenges completed by the students)
  • Several virtual machines
  • Courseware slides
  • Lab Manual
  • Lab access

 

Class Videos

Students will receive all class recordings via their emails. This will help them keep up with the class even if they have to miss time or even a whole day.

Support

Each student will have access to an InfoSec Addicts Group (infosecaddicts.com) for the class. Groups are where students can ask questions outside of the regular class hours. Additionally, this is where they can work with other students on lab exercises, homework, and challenges. A Strategic Security class mentor will be assigned to the InfoSec Addicts Group to answer questions (allow one day for responses). Likewise, a Customer Relationship Manager will get assigned to the class to manage questions and support issues.

 

Class Schedule

Track 1: Monday (23 April) to Friday (25 April) from 9am EST to 3pm EST each day.

Track 2: May 5th, 12th, 19th, and 26th 2018 from 10am to 3pm EST each Saturday

Fill out this form below to sign up for the class.

$200.00Select options

 

NOTE: Due to Joe McCray’s travel and work schedule (ex: short notice consulting/training engagements or changes to those engagements) classes may reschedule or cancel. In these situations a refund will NOT be granted as the class will re-run the following week, or additional days will be added to the class schedule to make up for this.

Offensive Cyber Expert Bundle

Do you really want to be the guy or girl that can just flat out hack! I’m talking about where it just doesn’t matter what’s in front of you – you know that you can figure it out.

It doesn’t matter if you are up against Linux, Windows Server 2016, SharePoint, web apps, or custom apps where you need to modify public exploit code to attack them.

If that’s what you want to be then this is the course bundle for you.

For today only you can purchase this entire class bundle for only $200 – just click the add to cart below:

$200.00Select options

 

linux

Being proficient in Linux in the InfoSec world today is an absolute must. This is the class that you absolutely want to take to not only get familiar with Linux but to learn how to use Linux to perform InfoSec tasks instead of just the basics of the operating system.

 

For today only you can purchase this entire class bundle for only $200 – just click the add to cart below:

$200.00Select options

 

powershell

Just like with Linux being proficient in PowerShell in the InfoSec world today is an absolute must because all of the Microsoft technologies today heavily utilize PowerShell. This is the class that you absolutely want to take to not only get familiar with PowerShell but to learn how to use PowerShell to perform InfoSec tasks.

 

For today only you can purchase this entire class bundle for only $200 – just click the add to cart below:

$200.00Select options

 

Offensive Cyber Operations
Offensive PowerShell with Cyber Range

This is the class where the rubber meets the road. This is the class where you put it all on the line and find out what works in the real world and what doesn’t. The Cyber Range is a full blown modern Windows environment (Windows Server 2016, Active Directory 2016, and SharePoint 2016 multi server farm)

 

For today only you can purchase this entire class bundle for only $200 – just click the add to cart below:

$200.00Select options

 

Exploit development

This is a fun class. 64bit exploit development. Learn how to write exploits, learn how to modify public exploit to suit your needs.

 

For today only you can purchase this entire class bundle for only $200 – just click the add to cart below:

$200.00Select options

 

 

Unlimited classes:

If you know that you are interested in this class as well as other InfoSec classes then you should consider the unlimited classes package for $49.99 per month. You can find out more about it by clicking on the link below:

https://infosecaddicts.com/unlimited-classes/

NOTE: Due to Joe McCray’s travel and work schedule (ex: short notice consulting/training engagements or changes to those engagements) classes may reschedule or cancel. In these situations a refund will NOT be granted as the class will re-run the following week, or additional days will be added to the class schedule to make up for this.

Offensive PowerShell with Cyber Range

Offensive PowerShell class with Cyber Range

On the 24th of March from 10am EST to 4pm  EST we will run the first online Offensive PowerShell course with our new Cyber range. The Cyber Range is a full blown modern Windows environment (Windows Server 2016, Active Directory 2016, and SharePoint 2016 multi server farm).

powershell

Here is your chance to use what you learned in the PowerShell class, and get a chance to use all of the popular PowerShell tools such as:

 

Cyber Range

Students will receive cyber range access on the 22nd of March and maintain access to the new cyber range until the end of April.

Support

Each student will receive access to an InfoSec Addicts Group for the class. Groups are where students can ask questions outside of the regular class hours, work with other students on lab exercises, homework, and challenges.

A class mentor is assigned to the InfoSec Addicts Group to answer questions (allow one day for responses).

Similarly, a Customer Relationship Manager is assigned to the class to manage questions and support issues.

Class Schedule

This class is going to run on Saturday the 24th of March from 10am EST to 4pm EST.

 

Class Cost

The class cost is regularly $500, but you can get it for $200 if you sign up before February 19th.

Fill out this form to sign up for the class.

$200.00Select options

 

Unlimited classes:

If you know that you are interested in this class as well as other InfoSec classes then you should consider the unlimited classes package for $49.99 per month. You can find out more about it by clicking on the link below:

https://infosecaddicts.com/unlimited-classes/

 

NOTE: Due to Joe McCray’s travel and work schedule (ex: short notice consulting/training engagements or changes to those engagements) classes may reschedule or cancel. In these situations a refund will NOT be granted as the class will re-run the following week, or additional days will be added to the class schedule to make up for this.

FREE Exploit Development webinar

Exploit developmentIn this FREE webinar Joe McCray will cover the fundamentals of exploit development and modifying public exploit code on penetration tests. This webinar is designed for people with little to no exploit development or programming experience.

This webinar will be held on the 22nd of February at 1pm EST

Click the link below to sign up for this webinar:

https://attendee.gotowebinar.com/register/5628748955745369601

 

Free Advanced Network Penetration Testing webinar

network penetration testingIn this FREE webinar Joe McCray will cover the fundamentals of the network penetration testing, and how to perform basic penetration testing tasks. This webinar is designed for people with little to no network penetration testing experience.

This webinar will be held on the 1st of February at 1pm EST

Click the link below to sign up for this webinar:

https://attendee.gotowebinar.com/register/6831470640505615106

network penetration testing

Free Python For InfoSec Professionals webinar

Python
Python

In this FREE webinar Joe McCray will cover the fundamentals of programming, and how an InfoSec Professional can use Python to perform common IT Security tasks. This webinar is designed for people with little to no programming experience.

This webinar will be held on the 25th of January at 1pm EST

Click the link below to sign up for this webinar:

https://attendee.gotowebinar.com/register/7329340500678816770

Free Introduction to Metasploit webinar

Metasploitable

In this FREE webinar Joe McCray will cover the basics of Metasploit, and how to perform common penetration testing tasks with it. This webinar is designed for people with little to no penetration testing experience.

This webinar will be held on the 18th of January at 1pm EST

Click the link below to sign up for this webinar:

https://attendee.gotowebinar.com/register/6619596948856358146

Metasploit

FREE Intro to Network Penetration Testing webinar

network penetration testing

In this FREE webinar Joe McCray will cover the fundamentals of the network penetration testing, and how to perform basic penetration testing tasks. This webinar is designed for people with little to no network penetration testing experience.

The webinar will run on the 12th of January at 1pm EST

Click the link below to sign up for this webinar:

https://attendee.gotowebinar.com/register/4309159080597474307

 

network penetration testing

Advanced Threat Hunting with Splunk

Advanced Threat Hunting

Advanced Threat Hunting with Splunk – When it comes to log analysis Splunk is one the most popular enterprise-grade solutions in the field today. It can pull logs from nearly any device in the network, and it can integrate with most of the popular security products on the market. In the InfoSec field today Splunk is a common tool for what called Cyber Threat Hunting/Hunt Teaming/Malware Hunting/Defensive Cyber Operations (DCO)/Cyber Threat Analysis and many other names.

 

As popular as Splunk is – surprisingly few people are comfortable performing security event analysis with it. We decided to develop a Hands-on Splunk course designed specifically for InfoSec Professionals that want to do HANDS-ON DEEP TECHNICAL SECURITY ANALYSIS with Splunk.

 

Class Syllabus

Module 1: Deploying Splunk, configuring logging and forwarding

  • Installing Splunk
  • Configuring logging in Windows and Linux
  • Setting up log forwarding
  • Understanding how Windows Event logging works

Advanced Threat hunting

 

Module 2: Attacking Servers and Workstations

  • Learning attacker tools/tactics/procedures (TTPs)
  • Generating real-world security events to analyze
  • Attacking Workstations
  • Attacking Application Servers
  • Learning what types of security events generate log events
  • Writing basic queries for common attacks
  • Analyzing PCAP files with Splunk

Advanced Threat hunting

 

 

Module 3: Hunting with Splunk

  • Data-Centric vs End-Point Hunting
  • Understanding IOCs/IOAs
  • Indicators of Compromise (IOCs)
  • Indicators of Attack (IOAs)
  • Integrating data from popular security products
  • Writing complex queries
  • Detecting Zero-Day attacks

Advanced Threat hunting

 

Who is this class for?

IT System Administrators, IT Security Professionals, SOC Analysts, First Responders, Incident Handlers, Intrusion Analysts, Malware Analysts

 

 

Class pre-requisites

Students should be familiar with using Windows and Linux operating environments and be able to troubleshoot general connectivity and setup issues.

Students should be familiar with VMware Workstation and be able to create and configure virtual machines.

Students are recommended to have a high-level understanding of key programming concepts, such as variables, loops, and functions; however, no programming experience is necessary.

Students will be provided with detailed courseware, detailed lab manuals, and copy/paste notes so that even if a student is not very strong technically they will be able to complete the lab exercises and take notes effectively.

 

Class Schedule

May 7th & 9th, 7:00 pm EST – 9:00 pm EST

 

Class Delivery Method

Live-online instructor-led

 

NOTE:

Online students will be given access to VMWare virtual machines to download for the class and the previous version of the Splunk course as well. A new updated version of the courseware will be delivered on the first day of class

 

Students will receive

  • 24 hours of CPEs
  • Several virtual machines
  • Courseware slides
  • Lab manual

Videos

Each class will be recorded and made available to the students via email. So you can keep up with the class even if you have to miss time or even a whole day.

Support

Students can request help via email based trouble ticketing system (allow 24 hours for a response). Send all questions/concerns to [email protected]

Class Cost: $200

The class cost is regularly $500, but you can get it for $200 if you sign up before April 20th.

Fill out this form to sign up for the class.

$200.00Select options

 

Unlimited classes:

If you know that you are interested in this class as well as other InfoSec classes then you should consider the unlimited classes package for $49.99 per month. You can find out more about it by clicking on the link below:

https://infosecaddicts.com/unlimited-classes/

 

NOTE: Due to Joe McCray’s travel and work schedule (ex: short notice consulting/training engagements or changes to those engagements) classes may reschedule or cancel. In these situations a refund will NOT be granted as the class will re-run the following week, or additional days will be added to the class schedule to make up for this.

Get Unlimited Classes from InfoSec Addicts

InfoSec Addicts is now offering Unlimited Classes access to all of the live-online classes offered each month. Classes like Network Penetration Testing, Web Application Penetration Testing, Malware Analysis, Python, PowerShell, and many more…

 Unlimited Classes

Foundation Courses:

Unlimited Classes

Offensive Cyber Courses:

classes

Defensive Cyber Courses:

classes

Scripting Courses:

classes

 

 

This package will enable purchasers to complete an unlimited number of our online courses for a 1 year period for only $49.99 per month. Sign up now!

$49.99 / monthSelect options

 

 

NOTE: Due to Joe McCray’s travel and work schedule (ex: short notice consulting/training engagements or changes to those engagements) classes may reschedule or cancel. In these situations a refund will NOT be granted as the class will re-run the following week, or additional days will be added to the class schedule to make up for this.

Also, unlimited program students can access all classes except those associated with special programs such as Pentester Candidate Program, Offensive Cyber Expert, and Defensive Cyber Expert.