Featuring guest speaker, Windows hacker, Co-Founder and CTO of InGuardians, Jay Beale

In this hands-on, demo-heavy webinar, Jay Beale of InGuardians attacks an intentionally vulnerable Windows system based on "Metasploitable 3." This machine is an open source project created for practicing Metasploit Windows exploitation.

Jay will first emulate a cyberattacker in his Red team mode, exploiting a chain of vulnerabilities, picking up flags as he goes. Then, Jay will switch into Blue team mode, demonstrating proactive cyber defenses to break not only his Red team attack, but other potential exploits as well.

Don't miss this fun and useful webinar, where you'll get the chance to enhance both your attack and defense skills!

After the webinar, get your own Metasploitable 3 CTF machine going—simply download a copy of Kali Linux and repeat the attack and explore the defenses yourself!

Photograph of Jay Beale

Jay Beale, CEO, CTO at InGuardians, Inc.

Jay Beale is CTO and CEO for InGuardians. He works on Kubernetes, Linux and Cloud-Native security, both as a professional threat actor and an Open Source maintainer and contributor. He's the architect of the open source Peirates attack tool for Kubernetes and Bustakube CTF Kubernetes cluster. Jay helps create and run DEF CON's Kubernetes CTF, is a member of the Kubernetes organization, and previously co-led the Kubernetes project's Security Audit Working Group. Since 2000, he has led training classes on Linux & Kubernetes security at public conferences and in private training.

Prefers reduced motion setting detected. Animations will now be reduced as a result.