[vc_row][vc_column][vc_custom_heading text=”VIRTUAL COURSES AT YOUR FINGERTIPS” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][vc_column_text]
Our Virtual Live Training options include courses on Android Malware, Exploit Development Level 2, Introduction to Exploit Development, Penetration Testing Level 2, and Penetration Testing with Metasploit.
Contact Bulb Security today to learn more about these live, virtual training opportunities.
[/vc_column_text][/vc_column][/vc_row][vc_row animation=”fadeInDown” bg_type=”bg_color” bg_override=”full”][vc_column width=”1/3″ css=”.vc_custom_1487014050473{padding-top: -15px !important;}” offset=”vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs”][vc_empty_space height=”16px”][vc_btn title=”ANDROID MALWARE” style=”outline-custom” outline_custom_color=”#40afe6″ outline_custom_hover_background=”#8b8a87″ outline_custom_hover_text=”#ffffff” align=”center” button_block=”true” link=”url:http%3A%2F%2Fwww.bulbsecurity.com%2Fsecurity-training%2Fvirtual-live-training%2Fandroid-malware%2F|||”][/vc_column][vc_column width=”1/3″ offset=”vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs”][vc_empty_space height=”16px”][vc_btn title=”INTRO TO EXPLOIT DEV.” style=”outline-custom” outline_custom_color=”#40afe6″ outline_custom_hover_background=”#8b8a87″ outline_custom_hover_text=”#ffffff” align=”center” button_block=”true” link=”url:http%3A%2F%2Fwww.bulbsecurity.com%2Fsecurity-training%2Fvirtual-live-training%2Fintro-to-exploit-development%2F|||”][/vc_column][vc_column width=”1/3″ offset=”vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs”][vc_empty_space height=”16px”][vc_btn title=”EXPLOIT DEV. LEVEL 2″ style=”outline-custom” outline_custom_color=”#40afe6″ outline_custom_hover_background=”#8b8a87″ outline_custom_hover_text=”#ffffff” align=”center” button_block=”true” link=”url:http%3A%2F%2Fwww.bulbsecurity.com%2Fsecurity-training%2Fvirtual-live-training%2Fexploit-development-level-2%2F|||”][/vc_column][/vc_row][vc_row animation=”fadeInDown” bg_type=”bg_color” bg_override=”full”][vc_column width=”1/6″ css=”.vc_custom_1487014098905{padding-top: -15px !important;}” offset=”vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs”][vc_empty_space height=”16px”][/vc_column][vc_column width=”1/3″ offset=”vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs”][vc_empty_space height=”8px”][vc_btn title=”PEN TEST W/ METASPLOIT” style=”outline-custom” outline_custom_color=”#40afe6″ outline_custom_hover_background=”#8b8a87″ outline_custom_hover_text=”#ffffff” align=”center” button_block=”true” link=”url:http%3A%2F%2Fwww.bulbsecurity.com%2Fsecurity-training%2Fvirtual-live-training%2Fpen-testing-with-metasploit%2F|||”][/vc_column][vc_column width=”1/3″ offset=”vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs”][vc_empty_space height=”8px”][vc_btn title=”PEN TESTING LEVEL 2″ style=”outline-custom” outline_custom_color=”#40afe6″ outline_custom_hover_background=”#8b8a87″ outline_custom_hover_text=”#ffffff” align=”center” button_block=”true” link=”url:http%3A%2F%2Fwww.bulbsecurity.com%2Fsecurity-training%2Fvirtual-live-training%2Fpen-testing-level-2%2F|||”][/vc_column][vc_column width=”1/6″ offset=”vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs”][vc_empty_space height=”16px”][/vc_column][/vc_row][vc_row animation=”fadeInDown” bg_type=”bg_color” bg_override=”full”][vc_column width=”1/3″ offset=”vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs”][vc_btn title=”ANDROID MALWARE” style=”outline-custom” outline_custom_color=”#40afe6″ outline_custom_hover_background=”#8b8a87″ outline_custom_hover_text=”#ffffff” align=”center” button_block=”true” link=”url:http%3A%2F%2Fwww.bulbsecurity.com%2Fservices%2Fsecurity-training%2Fvirtual-live-training%2Fandroid-malware%2F||”][/vc_column][vc_column width=”1/3″ offset=”vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs”][vc_btn title=”INTRO TO EXPLOIT DEV.” style=”outline-custom” outline_custom_color=”#40afe6″ outline_custom_hover_background=”#8b8a87″ outline_custom_hover_text=”#ffffff” align=”center” button_block=”true” css=”.vc_custom_1459971215474{padding-top: -10px !important;padding-bottom: -10px !important;}” link=”url:http%3A%2F%2Fwww.bulbsecurity.com%2Fservices%2Fsecurity-training%2Fvirtual-live-training%2Fintro-to-exploit-development%2F||”][/vc_column][vc_column width=”1/3″ offset=”vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs”][vc_btn title=”EXPLOIT DEV. LEVEL 2″ style=”outline-custom” outline_custom_color=”#40afe6″ outline_custom_hover_background=”#8b8a87″ outline_custom_hover_text=”#ffffff” align=”center” button_block=”true” css=”.vc_custom_1459971229538{padding-top: -10px !important;padding-bottom: -10px !important;}” link=”url:http%3A%2F%2Fwww.bulbsecurity.com%2Fservices%2Fsecurity-training%2Fvirtual-live-training%2Fexploit-development-level-2%2F||”][/vc_column][/vc_row][vc_row animation=”fadeInDown” bg_type=”bg_color” bg_override=”full”][vc_column width=”1/6″ offset=”vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs”][/vc_column][vc_column width=”1/3″ offset=”vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs”][vc_btn title=”PEN TESTING W/ METASPLOIT” style=”outline-custom” outline_custom_color=”#40afe6″ outline_custom_hover_background=”#8b8a87″ outline_custom_hover_text=”#ffffff” align=”center” button_block=”true” css=”.vc_custom_1459971242712{padding-top: -10px !important;padding-bottom: -10px !important;}” link=”url:http%3A%2F%2Fwww.bulbsecurity.com%2Fservices%2Fsecurity-training%2Fvirtual-live-training%2Fpen-testing-with-metasploit%2F||”][/vc_column][vc_column width=”1/3″ offset=”vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs”][vc_btn title=”PEN TESTING LEVEL 2″ style=”outline-custom” outline_custom_color=”#40afe6″ outline_custom_hover_background=”#8b8a87″ outline_custom_hover_text=”#ffffff” align=”center” button_block=”true” css=”.vc_custom_1459971258879{padding-top: -10px !important;padding-bottom: -10px !important;}” link=”url:http%3A%2F%2Fwww.bulbsecurity.com%2Fservices%2Fsecurity-training%2Fvirtual-live-training%2Fpen-testing-level-2%2F||”][/vc_column][vc_column width=”1/6″ offset=”vc_hidden-lg vc_hidden-md vc_hidden-sm vc_hidden-xs”][/vc_column][/vc_row][vc_row][vc_column][vc_empty_space height=”16px”][vc_separator][vc_empty_space][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]
About the instructor:
Georgia Weidman is a penetration tester, security researcher, and trainer. She holds a Master of Science degree in computer science, secure software engineering, and information security as well as holding CISSP, CEH, NIST 4011, and OSCP certifications. Her work in the field of smartphone exploitation has been featured in print and on television internationally. She has presented her research at conferences around the world including Shmoocon, Blackhat, Security Zone, and Bsides. Georgia has delivered highly technical security training for conferences, schools, and corporate clients to excellent reviews. Building on her experience, Georgia recently founded Bulb Security LLC (https://www.bulbsecurity.com), a security consulting firm specializing in security assessments/penetration testing, security training, and research/development. She was awarded a DARPA Cyber Fast Track grant to continue her work in mobile device security. She is the author of the upcoming book Penetration Testing: A Hands-on Introduction to Hacking from No Starch Press.
[/vc_column_text][/vc_column][/vc_row]