In this video, the speakers discuss the card game ‘Backdoors and Breaches’ which involves incident response and cybersecurity tactics. They explain the rules, procedures, and strategies for playing the game, using it as a tool for security training and awareness.
In this video, seasoned experts discuss effective strategies for starting and advancing a career in computer security. They emphasize the importance of understanding core principles over chasing buzzwords like ‘blockchain’ and ‘AI’ initially.
In this video, John Strand discusses the practical applications and features of Wireshark for network analysis. He demonstrates how to use Wireshark to capture and analyze packets, emphasizing its advantages over tcpdump.
In this video, Beau Bullock from Black Hills Information Security discusses penetration testing in Azure cloud environments. He provides insights into the methodology of attacking cloud environments, focusing on Azure but also touching on AWS and GCP.
🔗 Lab Resources https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md 🔗 VM Download Instructions https://www.antisyphontraining.com/john-strand-training-lab-download-instructions/ 🔗 Pay What You Can (PWYC) Training Schedule https://www.antisyphontraining.com/pay-what-you-can/ This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots …
In this video, the speakers discuss the complex and dynamic topic of cybersecurity. They explore various security challenges and the latest strategies for protecting digital assets.
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/06/2024_06_12_anticast_What-Game-of-Thrones-Can-Teach-Us-About-Cybersecurity_Dr-Gerald.pdf What Game of Thrones Can Teach Us About Cybersecurity with Dr. Gerald Auger In a realm where threats loom at every corner, where trust is a currency, and where the …
🔗 Lab Resources https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md 🔗 VM Download Instructions https://www.antisyphontraining.com/john-strand-training-lab-download-instructions/ 🔗 Pay What You Can (PWYC) Training Schedule https://www.antisyphontraining.com/pay-what-you-can/ This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots …
🔗 Lab Resources https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md 🔗 VM Download Instructions https://www.antisyphontraining.com/john-strand-training-lab-download-instructions/ 🔗 Pay What You Can (PWYC) Training Schedule https://www.antisyphontraining.com/pay-what-you-can/ This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots …
In this video, the speaker discusses their journey and insights into the field of computer security, emphasizing the importance of foundational knowledge and hands-on experience. They detail their career progression, from initial roles in technical support to specialized positions in security, highlighting key learning moments and decisions.