NMTC Expert Connect – Defend Your Cyber World


Date(s) - 10/08/2015
7:45 am - 9:30 am

University Center


0745-0815  – Coffee, cake & connect
0815-0900 –  Presentation, Q&A
0900-0930 –  Stay after; continue to make valuable connections and meet the presenter.

TOPIC – Defend Your Cyber World (before you get hacked).

Learn practical tools and techniques you can use to defend yourself online. Malicious actors use a number of different vectors to launch their attacks; they can attack your browser, your password, your phone- even your wireless network (at home or business).

Find out about the different kinds of attacks, how malware and viruses are used to compromise systems, or how passwords are cracked. Then discover how to defend yourself- how to make sure that you are using fortress-like passwords, secure software, and good policies.

Dr. Mike O’Leary, Chair, Department of Mathematics at Towson University, and NMTC Board member, has coached the Towson University cyber security team to the finals of the National Collegiate Cyber Defense Competition in 2010, 2012, and 2014.

He is the author of the newly-released book “Cyber Operations: Building, Defending, and Attacking Modern Computer Networks” published in 2015.

Cyber Operations walks you through all the processes to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.

What you’ll learn
•How to securely set up a complete network, from its infrastructure through web applications
•How to integrate defensive technologies such as firewalls and intrusion detection systems into your network
•How to attack your network with tools like Kali Linux, Metasploit, and Burp Suite
•How to gain situational awareness on your network to detect and prevent such attacks

Who this book is for

This book is for beginning and intermediate professionals in cyber security who want to learn more about building, defending, and attacking computer networks. It is also suitable for use as a textbook and supplementary text for hands-on courses in cyber operations at the undergraduate and graduate level.

LINK to purchase on AMAZON


Bookings are closed for this event.