Concept Deep Dive
The trainer presents relevant data via presentation, audio and other visual aids. This allows trainee the ability to understand the low level technical concepts.
The trainee executes the concepts in a contained custom environment that Obscurity Labs hosts internally.
The trainer executes the relevant information via video and audio based aids. Using custom labs and conceptual scenarios we can convey complex technical information.
In today's world, training is a critical component to hone skills, maintain proficiency and ensure mission success. As veteran members of both the information technology and cybersecurity fields, we recognize that training needs to focus on the content not the tools!
Keelyn is an active Red Team Operator and cybersecurity researcher. He develops both offensive and defensive cybersecurity tool-sets. His prior experience includes roles as a senior information system analyst and a senior cyber security analyst. He has spent over 13 years working within the DoD and a fortune 100 company. In addition to that he has also worked on advanced cybersecurity research projects with Smart Information Flow Technologies (SIFT) ranging from new concolic and symbolic fuzzing techniques to advanced cyber analytics.Email
Daniel has over 10 years of DoD IT and Cyber experience and he’s been tinkering with computers since he was 5 years old. During his tenure with the US Army, he served as the senior multidisciplinary subject matter expert and tactical planner for numerous defense cyber operations missions in which he was entrusted with the protection of over $1 billion of critical global aerospace and defense networks and systems. He was instrumental in cyber technology and doctrine development, working directly with various international and USG agencies, industry, and academia. He has delivered comprehensive offensive and defensive cybersecurity training for missions on enterprise systems, IoT devices, ICS/SCADA systems, and embedded systems.Email
Alex has extensive experience in the cyber security field. He has worked in the specialized field of adversary emulation in both Government and private organizations. Alex brings extensive knowledge from his experience on the Defense and Counter Infiltration Team for the Department of Defense (DoD) and as a senior cyber-security engineer on the Red Team for a Fortune 100 company. He has authored and co-authored several tools for the Cyber community with the most notable of which being the Empyre and SimplyEmail projects.Email