Keatron Evans

Managing Partner, KM Cyber Security LLC

Keatron Evans is regularly engaged in training, consulting, penetration testing and incident response for government, Fortune 50 and small businesses.

In addition to being the lead author of the best selling book, Chained Exploits: Advanced Hacking Attacks from Start to Finish, you will see Keatron on major news outlets such as CNN, Fox News and others on a regular basis as a featured analyst concerning cybersecurity events and issues.

For years, Keatron has worked regularly as both an employee and consultant for several intelligence community organizations on breaches and offensive cybersecurity and attack development. Keatron also provides world class training for the top training organizations in the industry, including Infosec Skills live boot camps and on-demand training.

Content from Keatron Evans

Incident Response
Learning Path
Incident Response

Incident Response

The Incident Response Learning Path will give students the understanding of how incidents are responded to at a high level, as well as allow them to build important technical skills through the hands-on labs and projects.

Introduction to Incident Response
Course
Introduction to Incident Response

Introduction to Incident Response

Review the fundamentals of incident response and learn how to build an IR team and effective playbook for handling incidents.

Stage 1 – Preparation
Course
Stage 1 – Preparation

Stage 1 – Preparation

This course deals briefly with some common definitions and severity criteria related to incident response. It ends with a high-level explanation of asset inventory and identification.

Stage 2 – Identification
Course
Stage 2 – Identification

Stage 2 – Identification

This course explores the process of identifying when there has been an event that falls into the category of becoming an incident. It also touches on classification levels for incidents.

Stage 3 – Containment
Course
Stage 3 – Containment

Stage 3 – Containment

Dive into determining what containment steps should be taken and when they should be taken, based on different scenarios.

Stage 4 – Investigation
Course
Stage 4 – Investigation

Stage 4 – Investigation

Learn the important role investigation plays in incident response.

Stage 5 – Eradication
Course
Stage 5 – Eradication

Stage 5 – Eradication

Ready to remove the threat from the environment? Learn how to do it right with this course on eradication.

Stage 6 – Recovery
Course
Stage 6 – Recovery

Stage 6 – Recovery

Now that we've eradicated the threats, let’s learn how to go into recovery.

Stage 7 – Follow Up/Lessons Learned
Course
Stage 7 – Follow Up/Lessons Learned

Stage 7 – Follow Up/Lessons Learned

The dust has settled, and the incident is over. In this phase, we deal with assessing our process and looking for ways to improve.

Technical Deep Dives with Tools of the Trade
Course
Technical Deep Dives with Tools of the Trade

Technical Deep Dives with Tools of the Trade

Dig in for hours of deep-dive technical exercises to master memory, network and host forensics techniques.

Exceptional learning experiences powered by LX Labs cyber expertise

Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.