Keatron Evans

Keatron L. Evans is a senior instructor with InfoSec Institute and Intense school. With over 15 years’ experience in training as an information security consultant, trainer and world renowned subject matter expert, he works to help businesses and government entities understand and prevent compromises to data, infrastructure and information systems. He has led several of the nation’s elite Red Teams. In addition to working with complex technology for more than 15 years, he regularly consults with or trains many federal intelligence and defense agencies on threats to digital defense systems and computer forensics. Evans received a B.A.S. degree from East Mississippi College, and later attended Mississippi State University earning a B.S. degree in Business Information Systems From 1995 to 2004, he worked with and for a variety of organizations including Microsoft, APQ Financial Services and UPS to name a few. During this time he also worked for two federal intelligence agencies. He specializes in Advanced Penetration Testing, and National Infrastructure Security, including SCADA systems. He has worked on and helped create several attack modeling systems and several counter intelligence security systems. As of today, much of Evans’s work remains classified. He’s published several books including the best-selling Chained Exploits: Advanced Hacking Attacks From Start to Finish. He also contributes articles and regular columns in leading technical publications including Network World and Information Security Magazine. Evans has been featured in The Wall Street Journal, The San Francisco Chronicle, The Chicago Tribune, The Philadelphia Enquirer, and many others. He’s also been featured in stories aired on CNN, Fox News and other media outlets. Evans teaches Ethical Hacking, Advanced Ethical Hacking, Computer Forensics, Advanced Computer Forensics and SCADA Security. Evans is also the primary developer of InfoSec Institute security courseware. Evans enjoys spending his spare time practicing Northern Style Wushu (Kung Fu), playing piano and bass guitar, and spending time with his family.

Sort options

Cyber Incident Response (Coursera)

Apr 22nd 2024
Cyber Incident Response (Coursera)
Course Auditing
Categories
Effort
Languages
The Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level, as well as allow them to build important technical skills through the hands-on labs and projects. This course starts with a high-level discussion of what happens at each phase [...]

Introduction to Cybersecurity Foundations (Coursera)

Apr 15th 2024
Introduction to Cybersecurity Foundations (Coursera)
Course Auditing
Categories
Effort
Languages
Most introductory or beginner level cybersecurity courses are not truly beginner level. Most of them assume some level of technical competence and expect that cybersecurity is not your first technical job role. However, as I've successfully mentored people coming from fields such as nursing, aviation (an airline pilot!), and [...]

Cybersecurity Policy Foundations (Coursera)

Apr 15th 2024
Cybersecurity Policy Foundations (Coursera)
Course Auditing
Categories
Effort
Languages
In this course, the learner will get a good look at what policies and frameworks do to keep the cybersecurity industry on-mission and formal. Without this area of cybersecurity, cybersecurity would mean too many people doing too many different things that might not even improve security. Learn how you [...]

Operating System Foundations (Coursera)

Apr 15th 2024
Operating System Foundations (Coursera)
Course Auditing
Categories
Effort
Languages
In this course, we take a look at what an actual operating system is. People often confuse operating systems with browsers and many other things. We take a look at Windows versus Linux versus MacOS and discuss how these operating systems evolved. We also get into some technical detail [...]

Technical deep dive with Incident Response tools (Coursera)

Apr 15th 2024
Technical deep dive with Incident Response tools (Coursera)
Course Auditing
Categories
Effort
Languages
The Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level, as well as allow them to build important technical skills through the hands-on labs and projects. This course starts with a high-level discussion of what happens at each phase [...]

Stages of Incident Response (Coursera)

The Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level, as well as allow them to build important technical skills through the hands-on labs and projects. This course starts with a high-level discussion of what happens at each phase [...]

Applied ChatGPT for Cybersecurity (Coursera)

Apr 8th 2024
Applied ChatGPT for Cybersecurity (Coursera)
Course Auditing
Categories
Effort
Languages
There's a lot of talk about good and bad use of ChatGPT, but in this course we will dig into using ChatGPT to do some hands on introductory SOC analyst/incident response work, starting with basic packet analysis and moving to basic reverse engineering of a piece of malware. ChatGPT [...]