| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Steven Becker A short, but informative walk through of what happens when one falls for a phishing attack. This is not theory, but what I've seen in the real world. Sometimes it is simple credential theft; other times sophisticated, targeted attacks to steal a paycheck or money. We will discuss how to do IR in a professional and personal capacity that requires technical skill, but also human compassion. Steven Becker started his current role as Information Systems Security Manager for Berkeley College towards the end of 2016. He has spent his career moving from IT support, to sysadmin, network admin, and the focusing heavily on security. Previously Steven worked primarily for various financial services. He has accumulated many technical and security certifications along the way, and has also been working with CompTIA as a Subject Matter Expert to help better shape the future of security professionals since 2017.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast