Page Not Found
Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
About me
This is a page not in th emain menu
Published:
Short description of portfolio item number 1
Short description of portfolio item number 2
Published in Journal 1, 2009
This paper is about the number 1. The number 2 is left for future work.
Recommended citation: Your Name, You. (2009). "Paper Title Number 1." Journal 1. 1(1). http://academicpages.github.io/files/paper1.pdf
Published in Journal 1, 2010
This paper is about the number 2. The number 3 is left for future work.
Recommended citation: Your Name, You. (2010). "Paper Title Number 2." Journal 1. 1(2). http://academicpages.github.io/files/paper2.pdf
Published in Journal 1, 2015
This paper is about the number 3. The number 4 is left for future work.
Recommended citation: Your Name, You. (2015). "Paper Title Number 3." Journal 1. 1(3). http://academicpages.github.io/files/paper3.pdf
Published:
My first ever public talk, given at the San Antonio Hacker’s Assocation monthly meetup back in 2019. I walked through a WTMP cleaner I’d made (Repo Here) and discussed the difficulties associated with operations artifact management and cleanup.
Published:
My team and I managed Air Force’s Lego-based Industrial Control System Training Model Booth at DEFCON 27 and presented it to various folks who’d visited the booth, including Dark Tangent and Will Roper (Assistant secretary of the Air Force for Acquisition, Technology and Logistics at the time).
Training, Air Force Cyber Command | USAF, 2018
Advanced Cyber Threat Emulation (ACTE) was a course created by myself to teach the members of the Air Force’s Enterprise Computer Emergency and Response Team’s (AFCERT) Threat Emulation Team the skills necessary to perform emulation-focused penetration tests of the United States Air Force’s various enterprise networks. This course acted as a qualification course that allowed them to perform their mission.
Training, San Antonio, 2021
Introduction to IoT exploitation serves as a primer to performing beginner-level IoT vulnerability research and exploitations.
Training, Tech Port San Antonio, 2023
Threat Theater: or How I Learned to Stop Worrying and Love The Adversary is a two day course designed to teach the basics of cyber threat intelligence and threat emulation.
Training, Tech Port San Antonio, 2023
Threat Theater: or How I Learned to Stop Worrying and Love The Adversary is a two day course designed to teach the basics of cyber threat intelligence and threat emulation.