{"product_id":"simulated-adversary-tactics-tools-training-jayson-e-street-dctlv2026","title":"Simulated Adversary: Tactics \u0026 Tools Training -  Jayson E. Street, Iain Jackson, and James Sheppard (CovertSwarm) - DCTLV2026","description":"\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eName of Training\u003c\/strong\u003e\u003cspan\u003e\u003cstrong\u003e: \u003c\/strong\u003eSimulated Adversary: Tactics \u0026amp; Tools Training\u003cbr\u003e\u003c\/span\u003e\u003cstrong\u003eTrainer(s)\u003c\/strong\u003e\u003cspan\u003e\u003cstrong\u003e:\u003c\/strong\u003e Jayson E. Street, Iain Jackson, and James Sheppard (CovertSwarm Trainers)\u003cbr\u003e\u003c\/span\u003e\u003cstrong\u003eDates\u003c\/strong\u003e\u003cspan\u003e\u003cstrong\u003e:\u003c\/strong\u003e August 10-11, 2026\u003cbr\u003e\u003c\/span\u003e\u003cspan\u003e\u003cstrong\u003eTime:\u003c\/strong\u003e 8\u003c\/span\u003e\u003cspan\u003e:00 am to 5:00 pm \u003cbr\u003e\u003c\/span\u003e\u003cstrong\u003eVenue\u003c\/strong\u003e\u003cspan\u003e\u003cstrong\u003e:\u003c\/strong\u003e \u003cmeta charset=\"utf-8\"\u003eLas Vegas Convention Center\u003cbr\u003e\u003c\/span\u003e\u003cstrong\u003eCost\u003c\/strong\u003e\u003cspan\u003e\u003cstrong\u003e: \u003c\/strong\u003e$2,250 (USD)\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eShort Summary:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003eThis hands-on course teaches students how real adversaries exploit the human element through reconnaissance, social engineering, physical attack simulations, and emerging AI-assisted techniques. Students learn all aspects of a social engineering engagement from start to finish. If you are already a security pro who wants to expand your skillset, or if you are interested in social engineering as a career, this class is for you.\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eCourse Description: \u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eEver wondered what it’s like to be the bad guy? This course immerses students in the mindset, tactics, and tools used by real-world adversaries who target people rather than systems. Led by Adversary for Hire Jayson E. Street, students learn how attackers gather intelligence, exploit trust, and turn human\u003cbr\u003eweaknesses into real compromise.\u003c\/p\u003e\n\u003cp\u003eThe course emphasizes the Security Awareness Engagement methodology, which uses controlled simulations to reveal real-world threats without causing harm. Students will conduct reconnaissance, design phishing and vishing scenarios, and craft physical attack payloads using the Hak5 Bash Bunny. The course also addresses the growing role of artificial intelligence in social engineering, including how adversaries manipulate AI systems through context shaping and persona engineering, as well as how defenders can recognize and mitigate these techniques. The focus is not on embarrassment or punishment, but on education, preparedness, and resilience. Students leave with practical skills they can immediately apply to security engagements and career building.\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cspan\u003e\u003cstrong\u003eCourse Outline: \u003c\/strong\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eDay 1\u003c\/strong\u003e\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003eIntroduction and course framing\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003eCurrent state of security awareness and human risk\u003cbr\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 1: Social Engineering Fundamentals\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eWhat social engineering is (and is not)\u003c\/li\u003e\n\u003cli\u003eRed teaming vs. physical penetration testing\u003c\/li\u003e\n\u003cli\u003eThe human factor in compromise\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 2: Reconnaissance\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eOnline reconnaissance\u003c\/li\u003e\n\u003cli\u003eReal-world reconnaissance\u003c\/li\u003e\n\u003cli\u003ePresenting findings effectively\u003c\/li\u003e\n\u003cli\u003eCase study\u003c\/li\u003e\n\u003cli\u003eLab: Conducting reconnaissance\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 3: Phishing \u0026amp; Pretexting\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eTarget selection\u003c\/li\u003e\n\u003cli\u003eEmotional triggers\u003c\/li\u003e\n\u003cli\u003eCase study\u003c\/li\u003e\n\u003cli\u003eLab: Constructing a phishing scenario\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 4: Engagement Preparedness\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003ePreparing for on-site engagements\u003c\/li\u003e\n\u003cli\u003eScope clarification and expectation management\u003c\/li\u003e\n\u003cli\u003eDefining success\u003c\/li\u003e\n\u003cli\u003eLegal and ethical authorization\u003c\/li\u003e\n\u003cli\u003eLab: Creating a “Get Out of Jail Free” authorization artifact\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 5: Weapons of Mass Education (Bash Bunny Focus)\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003e Overview of adversary simulation tools (Bash Bunny, Pineapple, OMG cables, Flipper Zero, etc.)\u003c\/li\u003e\n\u003cli\u003ePurpose and ethical use of these tools\u003c\/li\u003e\n\u003cli\u003eBash Bunny architecture and payload concepts\u003c\/li\u003e\n\u003cli\u003eWriting beginner Bash Bunny payloads\u003c\/li\u003e\n\u003cli\u003eCase study\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eDay 2\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eModule 6: AI as a Social Engineering Target and Tool\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eHow adversaries socially engineer AI systems through prompt context, role assignment, and persona shaping\u003c\/li\u003e\n\u003cli\u003eCommon guardrails implemented by developers and how attackers attempt to influence or bypass them\u003c\/li\u003e\n\u003cli\u003eUsing AI responsibly to generate realistic personas, pretexts, and narratives for defensive simulations\u003c\/li\u003e\n\u003cli\u003eDefensive considerations: recognizing AI-assisted social engineering and reducing organizational risk\u003c\/li\u003e\n\u003cli\u003eCase study and discussion\u003c\/li\u003e\n\u003cli\u003eLab: Configuring and deploying Bash Bunny payloads\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 7: Infiltration Planning\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003ePersona creation\u003c\/li\u003e\n\u003cli\u003ePassive vs. assertive approaches\u003c\/li\u003e\n\u003cli\u003eTiming, environment, and population analysis\u003c\/li\u003e\n\u003cli\u003eLab: Persona development for a simulated engagement\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 8: Execution Phase\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eApproach, deployment, and escape\u003c\/li\u003e\n\u003cli\u003eCase study\u003c\/li\u003e\n\u003cli\u003eLab: Scenario execution and role-play\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eModule 9: Aftermath \u0026amp; Education\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eDealing with compromised users\u003c\/li\u003e\n\u003cli\u003eOn-the-spot education\u003c\/li\u003e\n\u003cli\u003eCommunicating findings to management\u003c\/li\u003e\n\u003cli\u003eReporting without blame\u003c\/li\u003e\n\u003cli\u003eLab: Educating and debriefing impacted users\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003eClosing discussion and takeaways\u003cbr\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eDifficulty Level:\u003c\/strong\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003eBeginner to Intermediate\u003c\/p\u003e\n\u003cp\u003eBeginner Definition - The student has an interest in the topic presented and general technology knowledge that a power user or undergraduate student may have acquired.\u003c\/p\u003e\n\u003cp\u003eIntermediate Definition - The student has education and some experience in the field and familiarity with the topic being presented. The student has foundational knowledge that the course will leverage to provide practical skills on the topic.\u003cbr\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eSuggested Prerequisites:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003eNo formal prerequisites are required. Students should be comfortable using a laptop and web browser and have a general interest in security, social engineering, or adversary simulation. No prior scripting, AI, or hardware implant experience is required; all concepts are taught from first principles\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eWhat Students Should Bring: \u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli dir=\"ltr\"\u003eLaptop computer\u003c\/li\u003e\n\u003cli dir=\"ltr\"\u003eWillingness to participate in discussion and scenario-based exercises\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eWhat the Trainer Will Provide:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul\u003e\n\u003cli dir=\"ltr\"\u003eHak5 Bash Bunny device for each student (to keep)\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli dir=\"ltr\"\u003eCourse materials and lab guides\u003cbr\u003e\n\u003c\/li\u003e\n\u003cli dir=\"ltr\"\u003eExample payloads, personas, and simulation scenarios\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cstrong\u003eTrainer(s) Bio:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eJayson E. Street\u003c\/strong\u003e has been referred to as a “notorious hacker” by FOX25 Boston, a “World Class Hacker” by National Geographic’s Breakthrough series, and a “paunchy hacker” by Rolling Stone. He prefers to be known simply as a hacker, helper, and human. \u003c\/p\u003e\n\u003cp\u003eHe is the Chief Adversarial Officer at Secure Yeti and the author of the Dissecting the Hack series, which is required reading at multiple universities worldwide. Jayson is the DEF CON Groups Global Ambassador and has spoken at DEF CON, DEF CON China, GRRCon, SAINTCON, and numerous other conferences and academic institutions.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eIain Jackson\u003c\/strong\u003e is a Social Engineer and Academy Hive Leader at CovertSwarm, conducting vishing, physical infiltration, and adversary simulation engagements that test the human layer of organisational security. Alongside his operational work, he leads the programme designed to bring the next generation of security professionals into the industry.\u003c\/p\u003e\n\u003cp\u003eIain's path into cybersecurity didn't follow the traditional route. A background in education and hospitality gave him something many technical practitioners lack: a finely tuned understanding of human behaviour, communication, and the subtle dynamics of trust. It's a perspective he brings directly into his engagements, exploring how adversaries use psychology and AI to bypass human intuition, and building scenarios that reveal not just what went wrong, but why people made the decisions they did. His guiding principle is a quiet one: leave your targets better off than you found them.\u003c\/p\u003e\n\u003cp\u003eAs Academy Hive Leader, Iain designed and runs CovertSwarm's Academy Programme, an alternative pathway into cybersecurity that deliberately removes the traditional barriers to entry. The Academy exists for people who have the curiosity and passion but don't yet see a route in, those who may feel intimidated by existing structures, or who simply don't fit the conventional mould the industry has long favoured. For Iain, diversity of background isn't a nice-to-have; it's what makes a security team genuinely stronger.\u003c\/p\u003e\n\u003cp\u003eFrom demonstrating voice cloning in real time to exploring the defensive potential of the uncanny valley, Iain bridges the gap between cutting-edge attack techniques and practical human understanding, believing that the most effective security work happens when you truly understand the person on the other end of the line.\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eJames Sheppard\u003c\/strong\u003e is a security consultant at CovertSwarm specialising in social engineering and human-layer security testing. A former Royal Marines Commando, James brings a mission-focused mindset to cybersecurity, applying the same principles of reconnaissance, deception, and controlled breach tactics used in military operations to modern corporate environments.\u003c\/p\u003e\n\u003cp\u003eIn his role, James conducts advanced vishing, physical infiltration, and adversary-simulation engagements, helping organisations understand how attackers bypass security controls by targeting people rather than technology. By actively breaching client environments through realistic attack scenarios, he enables security teams to identify weaknesses in processes, awareness, and verification procedures before real adversaries can exploit them.\u003c\/p\u003e\n\u003cp\u003eJames is particularly focused on demonstrating how seemingly small human decisions can lead to major security compromises, translating real-world attack techniques into practical defensive improvements for organisations. Drawing on his military background and field experience conducting covert access operations, he brings a unique perspective on how disciplined attackers think, plan, and execute.\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cstrong\u003eRegistration Terms and Conditions: \u003c\/strong\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eTrainings are refundable before July 11, 2026, minus a non-refundable processing fee of $250.\u003c\/span\u003e\u003cspan\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eBetween July 11, 2026 and August 5, 2026 partial refunds will be granted, equal to 50% of the course fee minus a processing fee of $250.\u003c\/span\u003e\u003cspan\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eAll trainings are non-refundable after August 5, 2026.\u003c\/span\u003e\u003cspan\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eTraining tickets may be transferred to another student. Please email us at training@defcon.org for specifics.\u003c\/span\u003e\u003cspan\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eIf a training does not reach the minimum registration requirement, it may be cancelled. In the event the training you choose is cancelled, you will be provided the option of receiving a full refund or transferring to another training (subject to availability).\u003c\/span\u003e\u003cspan\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eFailure to attend the training without prior written notification will be considered a no-show. No refund will be given.\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eDEF CON Training may share student contact information, including names and emails, with the course instructor(s) to facilitate sharing of pre-work and course instructions. Instructors are required to safeguard this information and provide appropriate protection so that it is kept private. Instructors may not use student information outside the delivery of this course without the permission of the student.\u003c\/span\u003e\u003cspan\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eBy purchasing this ticket you agree to abide by the \u003c\/span\u003e\u003ca href=\"https:\/\/defcon.org\/html\/links\/dc-code-of-conduct.html\"\u003e\u003cspan\u003eDEF CON Training Code of Conduct\u003c\/span\u003e\u003c\/a\u003e\u003cspan\u003e and the registration terms and conditions listed above.\u003c\/span\u003e\u003cspan\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eSeveral breaks will be included throughout the day. Please note that food is not included.\u003c\/span\u003e\u003cspan\u003e\u003cb\u003e\u003c\/b\u003e\u003c\/span\u003e\u003c\/p\u003e\n\u003cp dir=\"ltr\"\u003e\u003cspan\u003eAll courses come with a certificate of completion, contingent upon attendance at all course sessions. Some courses offer an option to upgrade to a certificate of proficiency, which requires an additional purchase and sufficient performance on an end-of-course evaluation.\u003c\/span\u003e\u003c\/p\u003e","brand":"Las Vegas 2026","offers":[{"title":"Course only - Aug 10-11","offer_id":47688706064602,"sku":null,"price":2050.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0629\/2088\/4442\/files\/JaysonStreet.png?v=1774089054","url":"https:\/\/training.defcon.org\/products\/simulated-adversary-tactics-tools-training-jayson-e-street-dctlv2026","provider":"defcontrainings","version":"1.0","type":"link"}