Nik Alleyne entered a career into IT by accident, but cybersecurity by choice. With 20 years of experience in IT and 10+ years in cybersecurity, it is Nik’s experience that puts him in the position to be the best at what he does. Bundle that experience with his continued love for learning and sharing knowledge and you have someone committed to being the best he can be. Nik’s experience in building teams from scratch, building new SOC locations, expanding existing SOCs, and supporting Fortune 150 companies, helps him demonstrate and teach this content.
As a SANS Certified Instructor, Nik teaches both SEC503: Network Monitoring and Threat Detection In-Depth and SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling for SANS. Teaching at SANS allows Nik to demonstrate to the students how they can learn about these attacks, how they can detect them, and the measures they can put in place to prevent them where possible. In situations where they are unable to prevent them, he helps them understand how they can reduce the likelihood, thus reducing the impact and ultimately the risk.
Nik is the author of the book Learning By Practicing - Hack & Detect: Leveraging the Cyber Kill Chain for Practical Hacking and its Detection via Network Forensics and during his free time actively writes on his blog at www.securitynik.com. He also works with local colleges through their co-op programs, to aid in the development of their cybersecurity students.
His academic credentials include a MSc Cyber Security Forensics, BSc Computer Science, along with PG Cert (Hons) specialization in VoIP and Wireless Broadband. He currently holds (and or held) various industry certifications such as CISSP, GCIA, GCIH, GCFA, CCNP Security and R&S, CCMSE +VSX, SFCA, SFCE, SWSE, MCSE, MCITP/EA, BCCPA, IBM Certified Deployment Professional - Security QRadar SIEM V7.1, ITIL, ISO9001 Internal Auditor, and Splunk Admin/Knowledge Manager.
Why is it so important to continuously learn and train yourself?
ADDITIONAL CONTRIBUTIONS BY NIK ALLEYNE:
Getting To Know Nik Alleyne, SANS DEI Webcast, May 2021
Full Packet Capturing with TShark for Continuous Monitoring & Packet Threat Intelligence via IP, Domains and URLS
Canadian Webcast Series Part 3: ICS Defense: It’s Not a “Copy-Paste” From an IT Playbook & Importance of Intrusion Detection in a Compromised Prone World
- pktIntel - This tool is used to perform threat intelligence against packet data.
- QRadar Threat Intelligence - Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious Ips.
- DNSSpoof - Script to perform and teach how easy it is to build a DNS Spoofing tool using scapy.
Hack and Detect: Leveraging the Cyber Kill Chain for Practical Hacking and its Detection via Network Forensics
Learning By Practicing - Mastering TShark Network Forensics: Moving From Zero to Hero
You can read Nik's blog here.