top of page

CORE-IT

A free virtual event for the digital age.

March 24th to 30th

Presented by

BB1L.png
openbadge.png

CORE-IT is a free virtual event that brings together existing and next-generation industry talent with top-level training, trainers, mentors, companies, products, and opportunities. 

 

It has three educational tracks. On Day One, sessions will be live while the remaining days will offer on-demand videos of recorded sessions, allowing plenty of time to explore the exhibit hall and network. We will also be offering open badges, digital micro-credentials to pick up the skills you learn here.

Join in the fun by signing up today!

floorplan-withcallouts-foragendadocument
Sessions

SESSIONS

3 tracks of industry insight

TIME

in UTC-7

TRACK 1:

ESSENTIAL TOOLS

TRACK 2:

KEY PROTOCOLS

TRACK 3:

IN PRACTICE

9:00 - 9:20 AM

9:20 - 9:50 AM

10:00 - 10:30 AM

10:40 - 11:10 AM

11:20 - 11:50 AM

12:10 - 12:40 AM

12:50 - 1:20 AM

1:30 - 2:00 AM

2:10 - 2:40 AM

2:50 - 3:20 AM

3:40 - 4:10 AM

4:10 - 4:30 AM

Welcome: Introduction to CORE-IT 

1.1

Security Onion: Toolkit

1.2

Wireshark: Traffic Analysis

1.3

TraceWrangler: Trace File Editing 

1.4

Nmap: Network Scanning 

1.5

Tor: Diving into Darknets 

1.6

iPerf: Performance Benchmarking 

1.7

Autopsy: Open Source Forensics

1.8

NetScanTools Pro: Toolkit

1.9

Sneak Peek: Brim!

1.10

Kismet: 802.11 Detector/Sniffer

2.1

TCP/IP Communications Overview

2.2

IPv4 Core Functionality 

2.3

IPv6 Core Functionality 

2.4

802.11 Core Functionality

2.5

TCP Core Functionality

2.6

TLS Core Functionality 

2.7

HTTP Core Functionality 

2.8

DNS Core Functionality 

2.9

The Cold War for Encrypted DNS

2.10

The Cold War for Encrypted DNS –

Dr. Paul Vixie’s Perspective 

3.1

Five Quick Performance Measurement Exercises

3.2

Open Source Intelligence (OSINT) In Action 

3.3

Ethical Hacking Essentials

3.4

In the Packet Path: Tapping, Spanning, and More 

3.5

Long-Term Packet Capture

3.6

Hunting Suspects on the Darknet 

3.7

Social Engineering

3.8

Essential Elements of Pen Testing

3.9

Analyze TCP Window Scaling

3.10

Wireshark Decryption Tricks

End of Day: Wrap-Up

Speakers and Mentors

Speakers and Mentors Include...

lauraChappell.jpg

LAURA CHAPPELL

Founder of Chappell University, a pillar of the network analysis community for years.

KeithParsonsSpeakerPhoto.jpg

KEITH PARSONS

Founder of Wireless LAN Professionals and wireless enthusiast with over 80 certifications.

tonyFortunato.jpg

TONY FORTUNATO

Founder of The Technology Firm and network analyst with NATO top secret security clearance.

terryCutler.jpg

TERRY CUTLER

Pentester, CEO of Cyology Labs, voted #1 Top Influencer in CyberSecurity by IFSEC Global 2018.

NOTKirkThomas.png

KIRK THOMAS

Creator of NetScanTools, a toolset used by law enforcement and investigators interested in security.

snarkygeek.JPG

JOHN GONDER

Cisco Networking Academy director and instructor at Los Positas CC, latin jazz musician.

StephenPearson.jpg

Stephen Pearson

CEO of the High Tech Crime Institute with over 37 years of law enforecement experience.

exec-vixie.jpg

PAUL VIXIE

Internet pioneer, Internet Hall of Fame 2014, contributed to DNSSEC, BIND technical architect and interviewee for CORE-IT.

dougBurks.jpg

DOUG BURKS

Creator of Security Onion, a Linux distribution for intrusion detection enterprise security monitoring, and log management.

jasperBongertz.jpg

JASPER BONGERTZ

Creator of TraceWrangler, a trace file editing tool.

bettyDuBois.jpg

BETTY DUBOIS

Star network analyst, Chief Detective for Packet Detectives, Wireshark instructor.

don.png

DON DONZAL

Founder & Editor-in-Chief of The Ethical Hacker Network Online Magazine, community manager at eLearnSecurity.

JeffCarrell.jpg

JEFF CARRELL

Speaker and Author, master of IPv6 and network automation, Instructor and Course Developer at Hewlett Packard.

PhilRzewski.jpg

Phil Rzewski

Technical Director at Brim Security, industry veteran with over 25 years of building great tech.

andrewLewman.jpg

ANDREW LEWMAN

Co-founder of the Tor Project, one of the world's foremost darknet experts.

ginny.jpg

GINNY SPICER

Network Analyst at Chappell University, Student Outreach Chairperson for the HTCIA.

mikePennacchi.jpg

MIKE PENNACCHI

Analyst, Instructor, Owner of Network Protocol Specialists, LLC.

sakeBlok.jpg

SAKE BLOK

Relational therapist for computers systems and one of Wireshark's core developers.

henry.png

HENRY DANIELSON

CISSO, Cal Poly Adjunct Professor, CA Cybersecurity Institute Technical Advisor, Console Cowboy.

WheresWaldo2.jpg

JIM ARAGON

Wireshark expert and Technical Editor for many of the top Wireshark books including official WCNA books.

Mentors
e-book-cover-mockup-template-over-transp
Find Your New Mentor

Did you miss CORE-IT or forget to stop by the Student Union booth for your Mentor Manual?

No worries - download the ebook from here.

Badges
2,423 Open Badges Awarded

CORE-IT offered open badging to recognize the achievements of our attendees. Attendees could show off what they learned by taking tests to earn CORE-IT badges (and bragging rights). These verifiable microcredentials are linked to a page that gives their details. They can be shared on social media and used to show off to potential employers and colleagues.

tls_badge.png
Exhibit Hall
Exhibit Hall

The exhibit hall will be filled with virtual booths where vendors offer training, software, and sweet deals.

Networking
bottom of page