Thanks to visit codestin.com
Credit goes to Github.com

Skip to content
View bvoris's full-sized avatar

Block or report bvoris

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
bvoris/README.md


Introduction

Brad Voris has been working in Information Technology and Cybersecurity for over 25 years. He began his career in 1999 where he spent 15 years building a solid foundation in the IT field. In 2016, thanks to the suggestion of a colleague, Brad began studying to attain his CISSP Security Certification.

After passing the exam and officially entering the Security field, Brad continued his upward trend through the acquisition of an array of certifications: CISSP, CISM, CCSP, CCSK, Network+, MCP, MTA, VCA-DCV, NSE1, NSE2, NSE3, ACE, 100W – OPSEC, Trustee, AZ900, SC900, and Licensed Private Investigator for the State of Texas. Brad completed an Cybersecurity degree program with Wilmington University.

Continued knowledge and high-level performance has led him to work with a list of enterprise organizations including United Airlines, Texas Children’s Hospital, and Walmart.

He was quoted in the August 2017 issue of IS Decisions magazine, commenting on the insecurities of Microsoft Active Directory, stating: “Audit logs are in the form of event logs with specific error messages, some of which require Group Policy configuration changes on the Domain Controller Default Policy. Initially, there is VERY limited logs and in order to get more data you have to make a fair amount of changes to Group Policy. Very important.”

Brad’s accomplishments don’t end in the workplace though. He has co-authored two books in his field: Intrusion Detection Guide (Chapter 10: Compliance Frameworks), and Essentials of Cybersecurity (Chapter 8: Understanding Central Areas of Enterprise Defense).

Brad continues to work in IT and Cybersecurity while also sharing his knowledge and experience with others through a mentorship program where he gives guidance to up-and-comers seeking counsel in the field.

Brad graduated from Wilmington University with a degree in Cybersecurity in 2024.

Before his IT and Security journey, Brad served in the US Army.

I am starting to shift my focus away from PowerShell scripting to Python development. I will still support my larger PowerShell projects but newer projects will be in Python.

High Profile Public Presentations

My HOU.SEC.CON 2024 Presentation on MITRE ATT&CK Framework Threat Modeling

My HOU.SEC.CON 2025 Presentation on Mentorship



CATAGORIES

Public Speaking & Collective Works
Description: My public speaking events and published articles, books, and online content throughout my career.

Security Scripts and Applications
Description: Security scripts, applications, and security guides.


Active Directory Domain Services (ADDS) Scripts and Apps
Description: PowerShell Active Directory Domain Services Scripts and Apps that have various functions..


Domain Naming Service (DNS) Scripts and Apps
Description: Powershell Domain Naming Service (DNS) scripts and apps


MS Exchange Scripts and Apps
Description: PowerShell Microsoft Exchange Scripts and Apps


Various Scripts and Apps
Description: Various scripts and apps in Bash, PowerShell, Python, etc.


Certification, Training, & Career Resources
Description: Certification, Training, and Career Planning Resources


Connect with me at



Victim Of Technology

Popular repositories Loading

  1. mitreattackthreatmodeling mitreattackthreatmodeling Public

    This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework

    30 3

  2. SettingContent-MS-File-Execution SettingContent-MS-File-Execution Public

    SettingContent-MS File Execution vulnerability in Windows 10

    24 5

  3. PSNetMon PSNetMon Public

    PSNetMon - PowerShell Network Resource Monitoring Tool

    PowerShell 9 4

  4. RedTeamRecon RedTeamRecon Public

    Red Team Reconnaissance Tool for Windows systems

    8 2

  5. TrainingResources TrainingResources Public

    Links to free training, online tools, and career planning resources

    7 3

  6. CCSKTraining CCSKTraining Public

    Public Repository for CCSK Training

    6 4