Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

Introduction to Pentesting

In this video, Mike from Black Hills Information Security discusses the comprehensive process and various methodologies involved in penetration testing. He breaks down the different types of penetration tests, such as external, internal, and cloud pentests, and explains the phases from reconnaissance to reporting.

Kerberos & Attacks 101

In this video, Tim Medin from Red Siege Information Security discusses the fundamentals and intricacies of Kerberos authentication within Windows environments. He explains how Kerberos functions as the main authentication mechanism in Windows Active Directory, detailing its components and the process of ticket granting.

How (We) Run a Virtual Conference

In this video, Velda, John, Jason, and Deb discuss the challenges and insights of transitioning a physical conference to a virtual format due to unforeseen circumstances. They cover the technical setup, including the use of platforms like GoToWebinar and Discord, and the logistical adjustments needed to accommodate speakers and attendees remotely.

Shopping Cart

No products in the cart.