What we're about

Women's Society of Cyberjutsu is a 501c3 organization whose mission is to advance women in Cybersecurity.

Membership is comprised of Women either in the Information Security field or wanting to enter the field. We provide training (workshops, study groups, classes, mentoring, networking, internship/job placement assistance & resource-sharing, and opportunities.

You'll want to become a member via the website to take advantage of all the benefits! Membership options are: Full, Student/Military, and Associate (for our male friends).

New and seasoned professionals are encouraged to join. Our hashtag is #womenscyberjutsu

You can join our Slack channel here: https://womenscyberjutsu.org/page/Chapters

Our chapter group on our website is: SoCal Chapter of Women's Society of Cyberjutsu (https://womenscyberjutsu.org/members/group.aspx?id=180392)

Topics covered:

Penetration Testing, Exploitation, Password Cracking, Buffer Overflows, Shellcode, Vulnerability Assessment, Rootkits, Website/Web App Testing – XSS, CSRF, SQL Injection, Browser Exploitation, Information Assurance, OSINT, Certification & Accreditation – DIACAP, NIST, Tools of the trade – Metasploit, Nessus, Nmap, Burp Suite, Wireshark, Malware Analysis, Certification Study – CISSP, CEH, ECSA, Security+, Digital Forensics, Auditing, Reverse Engineering, Risk Assessments, Computer & Network Forensics, Wireless, Network Analysis, Social Engineering, Cryptography, VOIP, Architecture Standards, Incident response, Compliance & Governance, Business Continuity, SCADA, Disaster Recovery, Mobile

Upcoming events (1)

Red Team Blue Team Exercise: How to Think Like a Hacker

Remote option available! You must register here: Here:https://womenscyberjutsu.org/events/register.aspx?id=1203580 Topic Details: In this hands-on workshop, we will follow the steps of an attack from a red team perspective and consider how to remediate the actions for each phase from a blue team perspective. Objectives – What You Will Leave Knowing Knowledge of the five phases of an attack: Recon, Scanning, Gaining Access, Maintaining Access, Covering Tracks. How to use Kali Linux to gain access to a remote host. How to defend against certain types of attacks. Knowledge related to the EC-Council CEH certification. Knowledge related to the CompTIA PenTest+ certification Requirements: (1) Laptop with virtualization capability and at least 4 GB of RAM (8 GB preferred) (2) VirtualBox VM player (3) Kali Linux (note that there is a prebuilt version for VirtualBox available on the Kali site) You can still participate in this workshop as an observer if you do not have a computer available. Bio: Marcelle Lee is a threat researcher with WhiteOps, an adjunct professor in digital forensics and network security, and she also provides security consulting and training services through her company, Fractal Security Group, LLC. She specializes in network traffic analysis, malware analysis, phishing, and threat hunting. She is involved with many industry organizations, working groups, and boards, including the Women’s Society of Cyberjutsu, the NIST Cyber Competitions Working Group, and the Cybersecurity Association of Maryland Advisory Board. She also both builds and participates in cyber competitions, and shares her work through her Github site, https://marcellelee.github.io/. Marcelle has earned the CISSP, CSX-P, GCFA, GCIA, GCIH, GPEN, GISF, GSEC, GCCC, C|EH, CCNA, PenTest+, Security+, Network+, and ACE industry certifications. She holds four degrees, including a master’s degree in cybersecurity. She has received the Chesapeake Regional Tech Council Women in Tech (WIT) Award and the Volunteer of the Year award from the Women’s Society of Cyberjutsu. Marcelle frequently presents at conferences and training events, and is an active volunteer in the cybersecurity community. Social Media: www.linkedin.com/in/marcelleleewww.twitter.com/marcelle_fsg

Past events (20)

[WORKSHOP] This Saturday! Network Penetration Testings

Long Beach City College - Pacific Coast Campus

Photos (46)