Join us for this pay-what-you-can, hands-on, virtual workshop with Antisyphon Instructor, Beau Bullock as he provides a foundational understanding of cloud security, exploring essential concepts and practices for securing cloud environments.
Join us for this pay-what-you-can, hands-on, virtual workshop with Antisyphon Instructor, Beau Bullock as he provides a foundational understanding of cloud security, exploring essential concepts and practices for securing cloud environments.
Attendees will gain insight into core areas such as authentication, identity and access management (IAM), API access, common attack methods, misconfigurations, and security best practices. Practical labs will offer hands-on experience with industry-standard command line tools and automated scanners, helping participants understand and mitigate security risks in diverse cloud settings. Through the labs, attendees will apply cloud security tools and techniques to reinforce learning and develop practical skills.
System Requirements
Stable Internet access
x86 architecture CPU clocked at 2 GHz or higher that is capable of nested virtualization (Apple Silicon is currently not supported)
A computer with at least 8 GB of RAM. 16 GB is recommended
VMWare Workstation or VMWare Fusion (VirtualBox and other VM software is not supported)
Windows 10/11, MacOSX+, or a currently supported Linux Distribution
Full Administrator/root access to your computer or laptop
System should also have at least 40GB of available disk space to accommodate one VM
Student Requirements
Internet access
A credit card (You will be signing up for an AWS account. This services require a credit card for signing up.)
Check that Amazon AWS services are available in your country. (Note that if you cannot sign up for this service you will not be able to participate in the labs)
Beau is a Senior Security Analyst and Penetration Tester and has been with Black Hills Information Security since 2014. Beau has a multitude of security certifications and maintains his extensive skills by routinely taking training, learning as much as he can from his peers, and researching topics that he lacks knowledge in. He is a constant contributor to the infosec community by authoring open-source tools, writing blogs, frequently speaking at conferences and webcasts, and teaching his training class “Breaching the Cloud”.