Keatron Evans

Principal Security Researcher, Instructor & Author, Infosec

Keatron Evans is a cybersecurity and workforce development expert with over 17 years of experience in penetration testing, incident response and information security management for federal agencies and Fortune 500 organizations. He is Principal Security Researcher at Infosec Institute, where he empowers the human side of cybersecurity with cyber knowledge and skills to outsmart cybercrime. Keatron is an established researcher, instructor and speaker, as well as the lead author of the best selling book, Chained Exploits: Advanced Hacking Attacks from Start to Finish. He regularly speaks at industry events like Black Hat, OWASP, ISACA and RSA, and serves as a cybersecurity subject matter expert for major media outlets like CNN, Fox News, Information Security Magazine and more.

Keatron holds a Bachelor of Science in Business Information Systems and dozens of cybersecurity certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Cloud Security Professional (CCSP) and Licensed Penetration Tester (LTP). When not teaching, speaking or managing his incident response business, KM Cyber Security LLC, Keatron enjoys practicing various martial arts styles, playing piano and bass guitar, and spending time with his family.

Content from Keatron Evans

Incident Response
Learning Path
Incident Response

Incident Response

The Incident Response Learning Path will give students the understanding of how incidents are responded to at a high level, as well as allow them to build important technical skills through the hands-on labs and projects.

Cybersecurity Foundations
Learning Path
Cybersecurity Foundations

Cybersecurity Foundations

This learning path is an introductory cybersecurity path for people who have not been exposed to cybersecurity concepts in the workplace before. In these courses, a cybersecurity professional will walk the student through foundational concepts, commands and tools.

Introduction to Incident Response
Course
Introduction to Incident Response

Introduction to Incident Response

Review the fundamentals of incident response and learn how to build an IR team and effective playbook for handling incidents.

Stage 1 – Preparation
Course
Stage 1 – Preparation

Stage 1 – Preparation

This course deals briefly with some common definitions and severity criteria related to incident response. It ends with a high-level explanation of asset inventory and identification.

Stage 2 – Identification
Course
Stage 2 – Identification

Stage 2 – Identification

This course explores the process of identifying when there has been an event that falls into the category of becoming an incident. It also touches on classification levels for incidents.

Stage 3 – Containment
Course
Stage 3 – Containment

Stage 3 – Containment

Dive into determining what containment steps should be taken and when they should be taken, based on different scenarios.

Stage 4 – Investigation
Course
Stage 4 – Investigation

Stage 4 – Investigation

Learn the important role investigation plays in incident response.

Stage 5 – Eradication
Course
Stage 5 – Eradication

Stage 5 – Eradication

Ready to remove the threat from the environment? Learn how to do it right with this course on eradication.

Stage 6 – Recovery
Course
Stage 6 – Recovery

Stage 6 – Recovery

Now that we've eradicated the threats, let’s learn how to go into recovery.

Stage 7 – Follow Up/Lessons Learned
Course
Stage 7 – Follow Up/Lessons Learned

Stage 7 – Follow Up/Lessons Learned

The dust has settled, and the incident is over. In this phase, we deal with assessing our process and looking for ways to improve.

Technical Deep Dives with Tools of the Trade
Course
Technical Deep Dives with Tools of the Trade

Technical Deep Dives with Tools of the Trade

Dig in for hours of deep-dive technical exercises to master memory, network and host forensics techniques.

Introduction to Cybersecurity Foundations
Course
Introduction to Cybersecurity Foundations

Introduction to Cybersecurity Foundations

Learn what this path is all about!

Cybersecurity Foundations
Course
Cybersecurity Foundations

Cybersecurity Foundations

This course introduces you to the basic concepts that are usually not covered in other classes and boot camps for people entering the industry.

Operating System Foundations
Course
Operating System Foundations

Operating System Foundations

This is an introductory course to what an actual operating system is. We talk about Linux, Windows and MacOS. We talk about the differences in the operating systems and how they came to be.

Windows Command Line Foundations
Course
Windows Command Line Foundations

Windows Command Line Foundations

This course is an introduction to the Windows command line. There will be almost immediate hands-on exercises.

Linux Command Line Foundations
Course
Linux Command Line Foundations

Linux Command Line Foundations

This course is designed to get the learner started on using Linux and the Linux command line. We spend time building students' confidence with the Linux command line so that really in-depth boot camps won't leave the learner struggling with topics like syntax.

Cloud Computing Fundamentals
Course
Cloud Computing Fundamentals

Cloud Computing Fundamentals

This course is an introduction to cloud computing. It builds from the Network Fundamentals course in this path and prepares the learner for learning cloud security.

Cybersecurity Policy Framework and Guidelines
Course
Cybersecurity Policy Framework and Guidelines

Cybersecurity Policy Framework and Guidelines

This course is designed to introduce the learner to policy, frameworks and other non-technical areas of cybersecurity. One does not need to be technical to have a career in cybersecurity!

Cybersecurity Auditing
Course
Cybersecurity Auditing

Cybersecurity Auditing

This course is a basic introduction to cybersecurity auditing. The learner will understand how to tell if an organization's cybersecurity program has the right controls in place to properly measure their cybersecurity posture.

Pentest Demonstration: Appetizer for the Beginner
Course
Pentest Demonstration: Appetizer for the Beginner

Pentest Demonstration: Appetizer for the Beginner

This course is a walkthrough of a typical penetration test. We wanted to end the course with a peek into the real world of a cybersecurity job role. Penetration testing is one of the expertise areas of this instructor.

Risk Management – Cybersecurity Foundations
Course
Risk Management – Cybersecurity Foundations

Risk Management – Cybersecurity Foundations

This course is an introduction to risk management. While risk management may not be a hands-on technical role, it is one of the most important, as everything in cybersecurity can be tied back to risk.

Exceptional learning experiences powered by LX Labs cyber expertise

Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.