Shopping Cart

No products in the cart.

Beginner’s Guide to Entry-Level Cybersecurity

Go past the methodology and what you’ve learned on multiple-choice exams and take a hands-on approach to learn practical skills applicable to real-world cyber security job roles and positions.

In this free video series, our goal is to teach you information, tools, and technologies you will need to be successful in an entry-level cybersecurity position on day number one.

Our training is designed to get you hands on experience with the tools and technologies cybersecurity practitioners use daily. You will follow along with the instructors with your hands on the keyboard learning how to attack and defend computer networks.

Beginners guide to cybersecurity map with classes and labs

Cutting Through the Nonsense

Each class is built around real-world, practical skills that you can apply immediately, no matter your current level of knowledge. Beginners will find a welcoming and supportive environment, while experienced professionals will dive deeper into advanced topics to enhance their expertise. The focus is on making complex concepts easy to grasp, with hands-on labs and interactive lessons that keep you motivated and engaged. No matter your background, you’ll walk away feeling more confident and prepared to tackle cyber security world.

SOC Core Skills

John Strand's SOC Core Skills Class

Getting Started in Security

Getting Started in Security with BHIS and MITRE ATT&CK and Guest Instructor Patterson Cake

Active Defense & Cyber Deception

John Strand's Active Defense & Cyber Deception cybersecurity training class.

How Do You Get Started?

Pay-What-You-Can Registration

Example pay what you can certification

When you register for one of our Pay-What-You-Can classes, you will receive a Certificate of Completion (which qualifies for CEUs or Continuing Education Units) and access to our online virtual labs.

The best part about Pay-What-You-Can is that you can pay as little as $0.00 or whatever you can afford, and you can still join us for an unforgettable learning experience.

Free on YouTube

link to the Antisyphon YouTube

Each of our introductory pay-what-you-can classes are live streamed for free on YouTube and everyone is welcome to join! All of the recordings from each class are also available on YouTube, free of charge.

However, if you do not register for class through our website, you will not receive access to a Certificate of Completion or access to the online labs or cyber range.


Learn More About Each Class Below


SOC Core Skills

Target Audience: This course is designed for individuals who want to work in a Security Operations Center (SOC), including aspiring security analysts and current SOC professionals looking to improve their skills.

Topics Covered:

  • Introduction to SOC Work: An overview of SOC roles and responsibilities.
  • Log Collection and Analysis: How to gather, analyze, and interpret security logs from various systems and devices.
  • Threat Hunting: Techniques to proactively search for cyber threats within an organization’s network.
  • Incident Response: How to identify, contain, eradicate, and recover from security incidents.
  • SOC Tools: An introduction to common tools used in a SOC, such as SIEM (Security Information and Event Management) platforms, IDS/IPS (Intrusion Detection/Prevention Systems), and more.
  • MITRE ATT&CK Framework: Practical use of MITRE ATT&CK for threat detection and defense.

Objective: The goal is to provide hands-on skills that a SOC analyst needs, including the ability to analyze logs, detect threats, and respond to security incidents.

Resources: Visit the official Antisyphon Training GitHub for a full list of labs: https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md


Getting Started in Security with BHIS and MITRE ATT&CK

Target Audience: This course is designed for beginners in cybersecurity and those looking to gain an understanding of the MITRE ATT&CK framework.

Topics Covered:

  • Introduction to Cybersecurity: Basic concepts such as threat actors, malware, phishing, and the overall cybersecurity landscape.
  • MITRE ATT&CK Framework: Detailed breakdown of the MITRE ATT&CK framework, including how it’s structured and how to use it effectively.
  • Adversary Emulation: How to use the framework to emulate the behavior of advanced threat actors.
  • Threat Hunting: How to use ATT&CK to identify potential adversarial behavior in a network.
  • Detection and Defense: Practical guidance on how to map out adversarial tactics and improve defenses using MITRE ATT&CK.
  • Building a Career in Cybersecurity: Tips and guidance on how to break into the cybersecurity industry, including advice on certifications, home labs, and networking.

Objective: This course aims to give a solid foundation for beginners, helping them understand key cybersecurity concepts and how to use the MITRE ATT&CK framework to detect and defend against cyber threats.

Resources: Visit the official Antisyphon Training GitHub for a full list of labs: https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md


Active Defense & Cyber Deception

Target Audience: This course is ideal for blue teamers, network defenders, incident responders, and SOC analysts who want to take a more proactive approach to defense.

Topics Covered:

  • Active Defense: Techniques that involve engaging with and disrupting adversaries rather than simply defending passively.
  • Cyber Deception: Use of deception strategies, such as honeypots, honey tokens, and deceptive files, to lure attackers and learn from their tactics.
  • Network Defense: Practical strategies for defending a network using active defense mechanisms.
  • Legal Considerations: Covers the legal and ethical issues surrounding active defense and cyber deception.
  • Threat Intelligence Integration: How to use threat intelligence to anticipate attacks and deceive attackers.
  • Case Studies: Real-world examples of active defense in action.

Objective: By the end of the course, students will know how to set traps for attackers, mislead them, gather intelligence on their activities, and use this data to strengthen their defenses.

Resources: Visit the official Antisyphon Training GitHub for a full list of labs: https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md


Who is Antisyphon Training?

Antisyphon Training is Powered by BHIS

At AntiSyphon Training, we believe in making top-tier cybersecurity education accessible to everyone, regardless of their financial situation.

Founded by John Strand, a renowned expert in the cybersecurity community, our mission is to provide practical, hands-on training that prepares students for real-world challenges. With years of experience as a SANS instructor and founder of Black Hills Information Security (BHIS), John has built a reputation for delivering engaging courses that focus on offensive security, cyber defense, and incident response.

AntiSyphon Training offers a variety of classes, empowering students to develop practical skills in both red and blue team activities. We’re here to help you grow, no matter where you are in your cybersecurity journey.