UK’s leading bug bounty hunter lead cyber hacking workshop
The Investigator is teaming up with international bug bounty hunter, ethical hacker and cybercrime trainer Tom ‘Nom Nom’ Hudson to host this exclusive CPD training workshop delivered via Team on November 17.
It is aimed at operational investigators from across the world including: cyber crime investigators, digital media investigators, analysts, major crime investigators and industry professionals.
The workshop with provide you with all the latest best practice, challenges and trends designed to enhance your operational knowledge and understanding of this ever-evolving area.
This is the latest in the series of operational workshops being hosted by the Investigator that is specifically designed to help support investigators and their on-going learning. We have now run more than 350 events attended by investigators from the UK and across the world.
Everyone who attends via Teams will receive a certificate of attendance to support your ongoing Continuous Professional Development.
Our expert speaker/trainer
We are delighted to welcome Tom, who is one of the most engaging, entertaining and knowledgeable experts that we have worked with.
Tom has built up an enviable reputation as a leading international bug bounty hunter and ethical hacker. He tours the world taking part in high-profile competitions hosted by major international companies to find vulnerabilities in their systems which they can then patch. The companies offer large sums of money called bug bounties to the winner.
Tom recently won a competition hosted by UBER to find vulnerabilities in their system. He fended off competition from hackers/bug bounty hunters from across the world to be declared the winner.
Tom also works full-time as a cyber crime trainer and advisor in the North of England and is an expert at latest trends and developments.
The workshop will cover:
The role of ethical hackers and how they can inform cyber crime investigations
Who are bug bounty hunters and how can they help companies detect vulnerabilities in their systems? The life of a bug bounty hunter.
Current nature of targeted threats and how hackers use social profiling to carry out these targeted attacks
Advanced Phishing Techniques – current trends, challenges, best practice, debunking common myths
Common attacks using social media, website and SMS messages and how to investigate them. How hackers exploit mobile applications
An insight into current threat actors in cyber space, their motivation, Modus Operandi and how to mitigate the threat
Predictions about the nature of future threats and how cyber hacking will develop in the coming years.
Current Challenges related to Covid-19.
For full details on how to book click HERE