| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Description: The description was a dream: “Have you ever wanted to hack a Car or an ATM? Would you like to socially engineer your way into critical infrastructure facilities?” I submitted my resume, interviewed and accepted a position as a full time Penetration Tester. Less than a year later, as a n00bie Penetration Tester…How Did I get here? What have I learned? What’s next for the industry? There is so much value in listening and learning from the experience of a seasoned industry veteran, but what does the n00b with “fresh eyes” have to say? …find out in this talk. Bio: Brandon Edmunds is a member of the Coalfire Labs and Penetration Testing Team, he works with clients across all verticals to identify and remediate vulnerabilities in their business-critical applications and networks. He specializes in network and web application penetration testing. Brandon holds his GPEN certification and is currently enrolled in the Offensive-Security “Pentesting with BackTrack” course and going after his OSCP certification.io
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast