This class is not included in Data Day Texas 2016 registration. You must signup for it separately. AND, you *do not* need to sign up for Data Day in order to register for this class. Trey will only be offering one section of this class.
About the Course
Core Application Penetration Testing is the follow-up to Trey Blalock's Pentesting 101 course. Where the Pentesting 101 course covered the full stack, Core Application Penetration Testing focuses on the application layer. You are strongly recommended to sign up for Pentesting 101 before taking this course.
Here's what people who have taken Trey's classes are saying:
"Excellent, especially the non-technical aspects around engagement and report writing"
"Definitely solid, very glad for the opportunity. Of course you know that Trey is well qualified with the material, no question there, but beyond that, he was well organized, stayed reasonably on topic, and the tool kit provided was well considered and useful."
"The class was a really good high-level overview with a lot of information, tons of really helpful links and notes, and a little bit of depth where it made sense. Almost every topic was accompanied with "... and here's a list of books you should read if this interests you". I'd say it was well worth the time and cost."
About the Instructor
Trey Blalock (GIAC-GWAPT, GIAC-GPEN, GIAC-GCFA, CISA, CISM, CISSP, SSCP, NSA-IAM) has served as Manager of Global Security Operations / Security Architect for one of the worlds largest financial transaction hubs (S1 Corporation) overseeing all aspects of security for hundreds of web-banking environments, ATM networks, and point-of-sale transaction networks world-wide.
Currently on the National Board of Information Security Examiners (NBISE) Operational Security Testing Panel designing comprehensive testing solutions to evaluate skill levels of commercial penetration testers as well as military red team, and blue team technicians. This is primarily to be used by government & military to identify above-average talent in these areas.
Has over ten years of experience providing penetration testing and assessment services to hundreds of clients in the financial, government, retail, chemical, oil & gas, medical, educational, legal, telecom, and law enforcement sectors.
Has served as a Computer Forensic Expert Witness for the U.S. Department of Justice on multiple cases over the past three years and has managed all aspects of the computer forensics on some high profile cases such as "Donald Vance vs. Donald Rumsfield" and "American Boat Company vs. United States".
Conducted large-scale ISO-17799 based audits for financial organizations such as the State of California's Franchise Tax board which has over five thousand computer systems and conducts over 42 Billion dollars in transactions per year.
Performed over 100 manual penetration tests for Pfizer to help protect many of their well-known brands such as Advil, Celebrex, ChapStick, Zoloft, Viagra, and Xanax as well as many other sites critical to their production operations.
Represented Hewlett-Packard on the National Security Agency's code review board for Hewlett Packard's CMW operating system and supported all of Hewlett-Packards A and B-level "military security" trusted systems.
Provided architecture, configuration, installation, performance tuning, troubleshooting, protocol analysis, and production administration for numerous complex environments over the last ten years.