homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured: Solutions for Emerging Risks

    Discover tailored resources that translate emerging threats into actionable strategies

    Risk-Based Solutions

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. Q & A with James Shewmaker, Certified Instructor
SANS Cyber Defense

Q & A with James Shewmaker, Certified Instructor

October 22, 2018

Shewmaker.png

Meet James Shewmaker. James Shewmaker is the founder of and principal consultant at Bluenotch Corporation in Long Beach, California, which provides customized security services focusing on investigations, penetration testing, and analysis.

James authored and maintains the post-exploitation content in the SANS SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking course. Before becoming a SANS Certified Instructor in 2009, his creative technical work led him on many adventures, including "The Great Translator Invasion of 2003."

James led the development and operations of NetWars as a U.S. Cyber Challenge game in June 2009. He is currently developing an independent cyber challenge, Bunker011, and is involved in the U.S. Cyber Challenge as an instructor at Cyber Camps. James regularly teaches a Tactical Offense and Defense day at these events.

Learn more about James and his upcoming teaches of SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses

SANS: What made you choose to work in tech/security?

James Shewmaker: I get to be technical and creative. There's always a new take on something considered "classic" that keeps things interesting.

SANS: Tell us an interesting fact about yourself and your connection to the technology world?

James Shewmaker: I like solving problems creatively. I love to use a "hack" to make people's everyday work less tedious or limiting. For example, I've been in many situations where kiosk hacking skills helped me work around a buggy embedded system installation. "Software needs a USB driver to load drivers? Ok, maybe I can cheat and find another way to transfer files?"

SANS: What was your first SANS course you taught?

James Shewmaker: The first SANS course that I taught was SEC503: Intrusion Detection In-Depth. I also taught several of our forensics courses before my work led me closer to penetration testing activities. Then more recently the pendulum started swinging back to the defensive perspective. People I worked with drove this: "Who broke into the website?" became "Remember how you found the weakness? Can you test to see if we've properly fixed it?" and now "Ok, we aren't sure that we know how to prevent that attack, help us improve our defenses."

SANS: What song is missing from the NetWars playlist? What would you add and why?

James Shewmaker: "Drive it Like You Stole It" by The Glitch Mob. It represents what all InfoSec people should think about to keep things in perspective.

SANS: What SANS event are you looking forward to most this year?

James Shewmaker: I'm looking forward to Network Security 2018 in Las Vegas the most. There's so many things going on at the same time, especially our Internet of Things hacking night where we are free to play with gadgets that impact everyday life and are often overlooked from a security perspective.

SANS: How do you stay up-to-date with the latest cybersecurity information? Social media influencers, hashtags, blogs? Give examples.

James Shewmaker: I like to track Twitter for the bulk of my InfoSec news. There's a lot of noise to wade through, but it's going to be pretty relevant each day. If you haven't used Twitter for it yet, you can get great perspective by following two lists: DEFCON has a speaker list that contains anyone who has presented at DEFCON (https://twitter.com/defcon/lists/speakers), and the SANS Instructor list (https://twitter.com/SANSInstitute/lists/instructors). Between both of them, the most pressing news and issues will definitely be there. If you can't or won't use Twitter, I'd say follow the Internet Storm Center daily at https://isc.sans.org/.

SANS: Advice for someone taking a SANS course for the first time? Attending their first event?

James Shewmaker: My advice is to immerse yourself in the SANS experience. For most of us, there are too many distractions in day-to-day life, so take advantage of any bonus presentations or events at a conference to maximize your time.

SANS: What is a quote that inspires your work and why?

James Shewmaker: I often hear "Nobody would know to try that ?" Usually it's immediately after I finished doing that exact thing. I'm a firm believer in "There's nothing new under the sun." If I thought to do something pretending to be a bad guy for a penetration test, then you better believe I'm not the only one to think of it. I do love taking an old technique and using/abusing it in a modern way.

SANS: Why do you teach for SANS and NOT other educational programs?

James Shewmaker: When I first started getting involved with SANS it was because I thought, "These guys know what they're talking about, we should hang out." The folks at SANS, from the instructors to the students, are the kinds of people I want to be around and work with.

SANS: What advice do you have for students pursuing a career in cybersecurity?

James Shewmaker: I have two recommendations: challenge everything and get involved. There's a lot of incorrect information about the technology we deal with, so don't assume others are infallible authorities on any subject. Getting involved means presenting about your own research, publishing a blog, or just participating in an InfoSec group (mailing list, slack channel, or local conference). If you want more experience, Capture the Flag events can be fun, but consider the option of volunteering to help out a local non-profit organization with its security concerns.

SANS: What was your first piece of technology as a child? Why was it important at that time?

James Shewmaker: I'd have to say that the one thing that, from the first time I used it, made me realize the truth about technology's purpose of making life easier was a pulley. I spent some time growing up on a farm and there were so many ways we worked smarter, not harder. My grandfather was always inventing mechanisms with levers and pullies to perform some task that would normally take more people. I was little and I could lift things I wouldn't normally be able to when I found the right place to use that pulley.

SANS: Did we miss anything? Write your own question.

James Shewmaker: Favorite book or story? I like William Gibson's "Johnny Mnemonic" short story. I love the piece: "If they think you're crude, go technical; if they think you're technical, go crude." Such a simple way to describe tactical technology problems of cybersecurity.

To learn more about James Shewmaker and where you can take his next course, visit his SANS bio page: James Shewmaker, Certified Instructor

Catch him on Twitter @jimshew

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tags:
  • Cybersecurity and IT Essentials
  • Purple Team

Related Content

Blog
Cybersecurity and IT Essentials
April 3, 2020
Instructor Spotlight: Keith Palmgren, SANS Senior Instructor
Meet Keith Palmgren, a cybersecurity professional with over 30 years of experience, specializing in the IT Security field.
SANS_social_88x82.jpg
SANS Institute
read more
Blog
Cybersecurity and IT Essentials, Cyber Defense
July 5, 2018
Instructor Spotlight: Eric Conrad, SANS Fellow & Author
Meet Eric Conrad. SANS Faculty Fellow Eric Conrad is the lead author of SANS MGT414: SANS Training Program for CISSP® Certification, and co-author of SEC530: Defensible Security Architecture, SEC511: Continuous Monitoring and Security Operations and SEC542: Web App Penetration Testing and Ethical...
Danyell Shin
read more
Blog
Cybersecurity and IT Essentials, Offensive Operations, Pen Testing, and Red Teaming
June 8, 2018
Instructor Spotlight: Erik Van Buggenhout, SEC599 Co-Author
Meet Erik Van Buggenhout. Erik is the co-author of SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses. In addition to SEC599, Erik teaches SEC560 - Network Penetration Testing & Ethical Hacking and SEC542 - Web Application Penetration Testing & Ethical Hacking. He...
Danyell Shin
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn