top of page

CORE-IT WRAP-UP

Presented by

BB1L.png
openbadge.png

CORE-IT was a virtual event that brought together existing and next-generation industry talent with top-level training, trainers, mentors, companies, products, and opportunities. 

 

The event hosted three educational tracks. On Day One, the event was live while the remaining days offered on-demand videos of recorded sessions, allowing plenty of time to explore the exhibit hall and network. 

The CORE-IT team has now published a book, The Virtual Event Survival Guide, which breaks down the steps to host a successful virtual event. This guide includes checklists and objectives to ensure that your event stays on track and no curveball is unmanageable. The book is available to order physically or digitally through Amazon.

1601116527.png
Sessions

SESSIONS

3 tracks of industry insight

TIME

ESSENTIAL TOOLS

KEY PROTOCOLS

IN PRACTICE

9:00 - 9:20 AM

9:20 - 9:50 AM

10:00 - 10:30 AM

10:40 - 11:10 AM

11:20 - 11:50 AM

12:10 - 12:40 AM

12:50 - 1:20 AM

1:30 - 2:00 AM

2:10 - 2:40 AM

2:50 - 3:20 AM

3:40 - 4:10 AM

4:10 - 4:30 AM

Welcome: Introduction to CORE-IT 

1.1

Security Onion: Toolkit

1.2

Wireshark: Traffic Analysis

1.3

TraceWrangler: Trace File Editing 

1.4

Nmap: Network Scanning 

1.5

Tor: Diving into Darknets 

1.6

iPerf: Performance Benchmarking 

1.7

Autopsy: Open Source Forensics

1.8

NetScanTools Pro: Toolkit

1.9

Sneak Peek: Brim!

1.10

Kismet: 802.11 Detector/Sniffer

2.1

TCP/IP Communications Overview

2.2

IPv4 Core Functionality 

2.3

IPv6 Core Functionality 

2.4

802.11 Core Functionality

2.5

TCP Core Functionality

2.6

TLS Core Functionality 

2.7

HTTP Core Functionality 

2.8

DNS Core Functionality 

2.9

The Cold War for Encrypted DNS

2.10

The Cold War for Encrypted DNS –

Dr. Paul Vixie’s Perspective 

3.1

Five Quick Performance Measurement Exercises

3.2

Open Source Intelligence (OSINT) In Action 

3.3

Ethical Hacking Essentials

3.4

In the Packet Path: Tapping, Spanning, and More 

3.5

Long-Term Packet Capture

3.6

Hunting Suspects on the Darknet 

3.7

Social Engineering

3.8

Essential Elements of Pen Testing

3.9

Analyze TCP Window Scaling

3.10

Wireshark Decryption Tricks

End of Day: Wrap-Up

Speakers and Mentors

Speakers and Mentors Include...

lauraChappell.jpg

LAURA CHAPPELL

Founder of Chappell University, a pillar of the network analysis community for years.

KeithParsonsSpeakerPhoto.jpg

KEITH PARSONS

Founder of Wireless LAN Professionals and wireless enthusiast with over 80 certifications.

jasperBongertz.jpg

JASPER BONGERTZ

Creator of TraceWrangler, a trace file editing tool.

terryCutler.jpg

TERRY CUTLER

Pentester, CEO of Cyology Labs, voted #1 Top Influencer in CyberSecurity by IFSEC Global 2018.

NOTKirkThomas.png

KIRK THOMAS

Creator of NetScanTools, a toolset used by law enforcement and investigators interested in security.

ginny.jpg

GINNY SPICER

Network Analyst at Chappell University, Student Outreach Chairperson for the HTCIA.

StephenPearson.jpg

Stephen Pearson

CEO of the High Tech Crime Institute with over 37 years of law enforecement experience.

exec-vixie.jpg

PAUL VIXIE

Internet pioneer, Internet Hall of Fame 2014, contributed to DNSSEC, BIND technical architect and interviewee for CORE-IT.

dougBurks.jpg

DOUG BURKS

Creator of Security Onion, a Linux distribution for intrusion detection enterprise security monitoring, and log management.

sakeBlok.jpg

SAKE BLOK

Relational therapist for computers systems and one of Wireshark's core developers.

bettyDuBois.jpg

BETTY DUBOIS

Star network analyst, Chief Detective for Packet Detectives, Wireshark instructor.

don.png

DON DONZAL

Founder & Editor-in-Chief of The Ethical Hacker Network Online Magazine, community manager at eLearnSecurity.

JeffCarrell.jpg

JEFF CARRELL

Speaker and Author, master of IPv6 and network automation, Instructor and Course Developer at Hewlett Packard.

PhilRzewski.jpg

Phil Rzewski

Technical Director at Brim Security, industry veteran with over 25 years of building great tech.

andrewLewman.jpg

ANDREW LEWMAN

Co-founder of the Tor Project, one of the world's foremost darknet experts.

tonyFortunato.jpg

TONY FORTUNATO

Founder of The Technology Firm and network analyst with NATO top secret security clearance.

mikePennacchi.jpg

MIKE PENNACCHI

Analyst, Instructor, Owner of Network Protocol Specialists, LLC.

snarkygeek.JPG

JOHN GONDER

Cisco Networking Academy director and instructor at Los Positas CC, latin jazz musician.

henry.png

HENRY DANIELSON

CISSO, Cal Poly Adjunct Professor, CA Cybersecurity Institute Technical Advisor, Console Cowboy.

WheresWaldo2.jpg

JIM ARAGON

Wireshark expert and Technical Editor for many of the top Wireshark books including official WCNA books.

Mentors
e-book-cover-mockup-template-over-transp
Find Your New Mentor

Did you miss CORE-IT or forget to stop by the Student Union booth for your Mentor Manual?

No worries - download the ebook from here.

Badges
2,423 Open Badges Awarded

CORE-IT offered open badging to recognize the achievements of our attendees. Attendees could show off what they learned by taking tests to earn CORE-IT badges (and bragging rights). These verifiable microcredentials are linked to a page that gives their details. They can be shared on social media and used to show off to potential employers and colleagues.

tls_badge.png
Exhibit Hall
Exhibit Hall

The exhibit hall was filled with virtual booths where vendors offered training, software, and sweet deals.

Networking
bottom of page