How does TCP/IP networking really work under the hood? What makes network protocol’s tick? Understanding how network technologies work is key on how to break them from a security perspective. In what ways are the invisible networking protocols we use every day opening us to cyber attack? Check out this presentation to learn more.
Matthew Miller is cyber security and networking subject matter expert. He currently wears a software engineer hat at Disruptive Solutions, LLC and works on a malware forensics platform. Previously, Matthew served in the United States Navy and Special Operations for eight years conducting cyber operations for various missions including counter-terrorism. He holds a bachelor’s degree in computer science and various certifications including CISSP, GPEN, GPYC, and RHCSA.
Presented By: Matt Miller
Meetup Presentation Date: March 5th, 2018