Hack It and Track It

An unflinching hacker advances through treacherous binary as they become not only the detective but the murderer in this tertiary tale of penetration and attribution. In the world of cyber security, it is no longer acceptable to be on the blue team or the red team; the purple team is the only one that can win against our unforeseen adversaries. Analysts must learn how to attack the very systems they protect to understand the mindset of their adversary and find the valuable artifacts they leave behind.

In this course students will participate in hands-on labs that will teach them attack cycles. It will teach them how to bypass standard security measures using real-world scenarios and discover the artifacts being produced by these attacks both locally and in the cloud.

Max participants: 50
Cost: $2000

This is a Two Day Course
October 7-8, 2019

Technical Requirements:

Attendees must bring and use their own device. Attendees will be required to install a virtual machine (VM) that will include several tools before the class begins. The VM requires:

Memory: Minimum of 8GB (16GB preferred) RAM to allocate for the virtual machine

Disk Space: 32+ GB available


This session is recommended for:

  • Software Developers
  • Penetration Testers
  • Information Security Students


Monday October 7


09:00 – 10:00 Doors open.
10:00 – 10:10 Introduction
10:10 – 11:20 Class Rules and Maximizing Value
11:20 – 11:30 Break
11:30 – 12:30 Common Attack Vectors
12:30 – 13:15 Lunch (Provided)
13:15 – 14:15 More Attack Vectors
14:15 – 14:50 Local Forensic Fundamentals
14:50 – 15:00 Break
15:00 – 15:30 Cloud Forensic Fundamentals
15:30 – 17:00 Brute Force Hands-On Lab

Tuesday October 8


09:00 – 10:00 Doors open.
10:00 – 11:20 Brute Force Hands-On Lab
11:20 – 11:30 Break
11:30 – 12:30 Brute Force Hands-On Lab
12:30 – 13:15 Lunch (Provided)
13:15 – 14:50 SQL Injection Hands-On Lab
14:50 – 15:00 Break
15:00 – 16:30 SQL Injection Hands-On Lab
16:30 – 17:00 Questions & Answers

*Schedule subject to change


Peter is an Information Security Consultant at Nuix. He has more than ten years’ experience in federal law enforcement and another ten years’ experience as an Information technologies and radio frequency engineer.

As a Special Agent with the United States Secret Service, Peter was assigned to the Electronic Crimes Task Force and was the lead forensic investigator on many computer crimes, network intrusions, and wireless exploitation cases. Peter is also a federally certified instructor and has taught cyber investigations to domestic and foreign law enforcement agencies around the world.

Peter holds a Bachelor of Science in Computer Information Systems from the University of Maryland University College and is a certified forensic examiner by the Department of Homeland Security.


Chris is the Director of Audit & Compliance at Nuix where he is responsible for maintaining a comprehensive governance, risk, and compliance program. Chris is a cybersecurity and Nuix Engine subject matter expert and a former technical trainer at Nuix. He helped develop Nuix’s training curriculum and delivered software and conceptual training to customers around the world regarding forensic investigations, cybersecurity, and eDiscovery.

Before joining Nuix, Chris worked at the Mid-States Organized Crime Information Center & Springfield Missouri Police Department where he supported 1700 federal, state, and local law enforcement agencies by preforming forensic exams and testifying in court.