Kevin Cardwell

Kevin is considered an authority on information security and vulnerability assessments. He is a developer, author, and instructor in computer forensics and hacking courses. He is the author of the Center for Advanced Security and Training (CAST) Advanced Network Defense and Advanced Penetration Testing courses, Building Virtual Pentesting Labs for Advanced Penetration Testing, Advanced Penetration Testing for Highly Secured Environments (second edition), and Backtrack: Testing Wireless Network Security. He has conducted technical presentations at Blackhat USA, Hacker Halted, ISSA, and TakeDownCon conferences as well as many others. Kevin holds a bachelor of science degree in computer science from National University in California and a Master of science in software engineering from Southern Methodist University (SMU).

Sort options

Introduction to Prompt Injection Vulnerabilities (Coursera)

In this course, we enter the space of Prompt Injection Attacks, a critical concern for businesses utilizing Large Language Model systems in their AI applications. By exploring practical examples and real-world implications, such as potential data breaches, system malfunctions, and compromised user interactions, you will grasp the mechanics of [...]

Introduction to Cybersecurity Fundamentals (Coursera)

"Introduction to Cybersecurity Fundamentals" is a concise yet comprehensive course designed to provide participants with a solid understanding of the essential principles and practices in the field of cybersecurity. In just 90 minutes, learners will embark on a journey into the world of cybersecurity, learning to think like a [...]

Deception As a Defense (Coursera)

May 26th 2025
Deception As a Defense (Coursera)
Course Auditing
Categories
Effort
Languages
In this course, defensive concepts will be explored and the power of using deception at different layers of the network. The attacker depends on information that is gathered during their surveillance, and with deception we change the network at layer 2-4 and the result of this is the attacker’s [...]