Register now for our upcoming December Secure Code Summit! Register Here
Shopping Cart

No products in the cart.

Black Friday 2024

Subscribe to Access 40+ On-Demand Courses!

Starting today November 26th through December 1st, 2024, when you sign up for our Black Friday deal you will get access forty On-Demand classes on the Antisyphon Training platform for only $1,500 for the year!

In the On-Demand Antisyphon Training platform we have teamed up with cybersecurity practitioners from all over the world to deliver hands-on training developed from the perspective of what our instructors are seeing in the real world of cybersecurity.

Red Team | Blue Team | Incident Response | Cloud |
Artificial Intelligence | Forensics | Threat Hunting |
Programming | OSINT | Fundamentals & MORE!


What is Included?

Upon enrollment students will receive 1-year unlimited access to over 40 on-demand classes available 24-7 via the Antisyphon Training On-Demand Platform.

Certificate of Completion

Example pay what you can certification

When you complete an Antisyphon Training class, you will receive a Certificate of Completion (which qualifies for CEUs or Continuing Education Units).

Cyber Range Access

Students will receive 1-year access to the MetaCTF Cyber Range.

  • Varied Challenges: Covers cryptography, forensics, penetration testing, and more.
  • Progressive Levels: Offers ten ACE-T™ certification levels with increasing difficulty.
  • Guided Learning: Challenges include hints and links to learning materials.
  • All Skill Levels: Suitable for beginners and advanced users with tutorials and hints.
  • Hands-On Training: Focuses on real-world, practical cybersecurity skills.
  • Regular Updates: New challenges added frequently to keep content fresh.
  • Real-World Scenarios: Simulates business networks for practical skill-building.


Full Access to Entire Course Library

Each class is built around real-world, practical skills that you can apply immediately, no matter your current level of knowledge. Beginners will find a welcoming and supportive environment, while experienced professionals will dive deeper into advanced topics to enhance their expertise. The focus is on making complex concepts easy to grasp, with hands-on labs and interactive lessons that keep you motivated and engaged. No matter your background, you’ll walk away feeling more confident and prepared to tackle cyber security world.

HackerOps with Ralph May course badgeHackerOps with Ralph May course badge
Ralph May
OD
Live

Get Started in Cybersecurity for Free

If you are just getting started in your cybersecurity journey and you’re looking to learn the fundamentals, we have developed three pay-what-you-can classes designed to prepare students with the practical cybersecurity skills they need to get started working in this field. We are so proud and confident these classes will help you in your journey, we made them available for free on YouTube, so you can watch and learn any time.


SOC Core Skills

Target Audience: This course is designed for individuals who want to work in a Security Operations Center (SOC), including aspiring security analysts and current SOC professionals looking to improve their skills.

Topics Covered:

  • Introduction to SOC Work: An overview of SOC roles and responsibilities.
  • Log Collection and Analysis: How to gather, analyze, and interpret security logs from various systems and devices.
  • Threat Hunting: Techniques to proactively search for cyber threats within an organization’s network.
  • Incident Response: How to identify, contain, eradicate, and recover from security incidents.
  • SOC Tools: An introduction to common tools used in a SOC, such as SIEM (Security Information and Event Management) platforms, IDS/IPS (Intrusion Detection/Prevention Systems), and more.
  • MITRE ATT&CK Framework: Practical use of MITRE ATT&CK for threat detection and defense.

Objective: The goal is to provide hands-on skills that a SOC analyst needs, including the ability to analyze logs, detect threats, and respond to security incidents.

Resources: Visit the official Antisyphon Training GitHub for a full list of labs: https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md


Getting Started in Security with BHIS and MITRE ATT&CK

Target Audience: This course is designed for beginners in cybersecurity and those looking to gain an understanding of the MITRE ATT&CK framework.

Topics Covered:

  • Introduction to Cybersecurity: Basic concepts such as threat actors, malware, phishing, and the overall cybersecurity landscape.
  • MITRE ATT&CK Framework: Detailed breakdown of the MITRE ATT&CK framework, including how it’s structured and how to use it effectively.
  • Adversary Emulation: How to use the framework to emulate the behavior of advanced threat actors.
  • Threat Hunting: How to use ATT&CK to identify potential adversarial behavior in a network.
  • Detection and Defense: Practical guidance on how to map out adversarial tactics and improve defenses using MITRE ATT&CK.
  • Building a Career in Cybersecurity: Tips and guidance on how to break into the cybersecurity industry, including advice on certifications, home labs, and networking.

Objective: This course aims to give a solid foundation for beginners, helping them understand key cybersecurity concepts and how to use the MITRE ATT&CK framework to detect and defend against cyber threats.

Resources: Visit the official Antisyphon Training GitHub for a full list of labs: https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md


Active Defense & Cyber Deception

Target Audience: This course is ideal for blue teamers, network defenders, incident responders, and SOC analysts who want to take a more proactive approach to defense.

Topics Covered:

  • Active Defense: Techniques that involve engaging with and disrupting adversaries rather than simply defending passively.
  • Cyber Deception: Use of deception strategies, such as honeypots, honey tokens, and deceptive files, to lure attackers and learn from their tactics.
  • Network Defense: Practical strategies for defending a network using active defense mechanisms.
  • Legal Considerations: Covers the legal and ethical issues surrounding active defense and cyber deception.
  • Threat Intelligence Integration: How to use threat intelligence to anticipate attacks and deceive attackers.
  • Case Studies: Real-world examples of active defense in action.

Objective: By the end of the course, students will know how to set traps for attackers, mislead them, gather intelligence on their activities, and use this data to strengthen their defenses.

Resources: Visit the official Antisyphon Training GitHub for a full list of labs: https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md


Who is Antisyphon Training?

Antisyphon Training is Powered by BHIS

At AntiSyphon Training, we believe in making top-tier cybersecurity education accessible to everyone, regardless of their financial situation.

Founded by John Strand, a renowned expert in the cybersecurity community, our mission is to provide practical, hands-on training that prepares students for real-world challenges. With years of experience as a SANS instructor and founder of Black Hills Information Security (BHIS), John has built a reputation for delivering engaging courses that focus on offensive security, cyber defense, and incident response.

AntiSyphon Training offers a variety of classes, empowering students to develop practical skills in both red and blue team activities. We’re here to help you grow, no matter where you are in your cybersecurity journey.