About

Michael Wylie, MBA, CISSP is the Sr. Manager of a 24/7/365 global managed threat hunting team. Prior to his current role, he was the Director of Cybersecurity Services at a top 100 CPA firm where he built the offensive and defensive security service practices. Michael has developed and taught numerous courses for the U.S. Department of Defense, DEFCON, Moorpark College, California State Universities, and for clients around the world. Michael is the winner of numerous SANS challenge coin and holds the following credentials: CISSP, CCNA R&S, CCNA CyberOps, GPEN, GMON, GCFE, TPN, CEH, CEI, VCP-DCV, CHPA, PenTest+, Security+, Project+, CNVP, Microsoft Azure Fundamentals, and more. Twitter: @TheMikeWylie.

Videos:

Recordings of prior talks, workshops, interviews, and events can be found here: https://www.youtube.com/playlist?list=PLUP_XONq0uSCAGPCQaqJt6xU7CohJTbnw

Teaching & Workshops:

  • Moorpark College: Intro to Pen Testing
  • Moorpark College: CEH
  • Moorpark College Blue Team & Threat Hunting
  • ISSA: Using NMAP for network scanning and penetration testing
  • ISACA: Using NMAP for network scanning and penetration testing
  • BsidesLV: Using NMAP for network scanning and penetration testing
  • California State University, Northridge: Information Security & Information Assurance
  • ISSA: Using Wireshark for Incident Response and Threat Hunting
  • Moorpark College: CCNA R&S
  • Department of Defense: Certified Ethical Hacker
  • Department of Defense: Security+
  • Department of Defense: CCNA R&S
  • ShellCon: Wireshark for Incident Response and Threat Hunting
  • DEFCON 27: Wireshark for Incident Response and Threat Hunting
  • BSidesLV: Wireshark for Incident Response and Threat Hunting
  • ISSA: Fundamental of Malware Analysis
  • ISACA: Preparing for the Event – Best Practices for Incident Response and Root-Cause Forensics
  • Cloud Security Alliance (CSA): Examining Cloud File Storage Incidents
  • OWASP: Wireshark for IR & Threat Hunting
  • WSC: Linux for Cybersecurity
  • ISSA NAC – Wireshark for IR & Threat Hunting
  • ISSA Grand Traverse – Wireshark for IR & Threat Hunting
  • ISSA Chattanooga – Wireshark for IR & Threat Hunting
  • CSA LA: Intro to Linux for InfoSec
  • DEFCON 28: Wireshark for Incident Response & Threat Hunting
  • DEFCON 28: Fundamentals of Malware Analysis

Talks:

Publications:

News & Media:

Certifications:

  • ISC2 – CISSP
  • Cisco – CCNA R&S
  • Cisco – CCNA CyberOps
  • GIAC – GPEN
  • GIAC – GMON
  • GIAC – GCFE
  • TPN – Certified TPN Assessor
  • EC-Council – CEH
  • EC-Council – CEI
  • VMware – VCP-DCV
  • CHPA
  • CompTIA – PenTest+
  • CompTIA – Security+
  • CompTIA – Project+
  • CompTIA – Network Vulnerability Assessment Professional
  • Microsoft – Azure Fundamentals