Join us Next Wednesday for our first ever Incident Response CTF Competition hosted by our friends at @metactf ! For more information on our FREE CTF Competition or our FREE Incident Response Summit, you visit us here: https://www.antisyphontraining.com/event/incident-response-summit/
In this video, John Strand discusses the practical applications and features of Wireshark for network analysis. He demonstrates how to use Wireshark to capture and analyze packets, emphasizing its advantages over tcpdump.
In this video, Beau Bullock from Black Hills Information Security discusses penetration testing in Azure cloud environments. He provides insights into the methodology of attacking cloud environments, focusing on Azure but also touching on AWS and GCP.
In this video, BB King discusses advanced techniques for leveraging Python in open-source intelligence (OSINT) gathering. He demonstrates how to extract and analyze data, providing insights into handling and parsing responses from various APIs and web services.
🔗 Lab Resources https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md 🔗 VM Download Instructions https://www.antisyphontraining.com/john-strand-training-lab-download-instructions/ 🔗 Pay What You Can (PWYC) Training Schedule https://www.antisyphontraining.com/pay-what-you-can/ This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots …
In this video, the speakers discuss the complex and dynamic topic of cybersecurity. They explore various security challenges and the latest strategies for protecting digital assets.
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/06/2024_06_12_anticast_What-Game-of-Thrones-Can-Teach-Us-About-Cybersecurity_Dr-Gerald.pdf What Game of Thrones Can Teach Us About Cybersecurity with Dr. Gerald Auger In a realm where threats loom at every corner, where trust is a currency, and where the …
In this video, Kent and Jordan discuss effective practices for securing Active Directory and preventing common penetration testing exploits. They explore techniques like establishing strong password policies, disabling outdated protocols, and implementing system monitoring to enhance security.
🔗 Lab Resources https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md 🔗 VM Download Instructions https://www.antisyphontraining.com/john-strand-training-lab-download-instructions/ 🔗 Pay What You Can (PWYC) Training Schedule https://www.antisyphontraining.com/pay-what-you-can/ This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots …
🔗 Lab Resources https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md 🔗 VM Download Instructions https://www.antisyphontraining.com/john-strand-training-lab-download-instructions/ 🔗 Pay What You Can (PWYC) Training Schedule https://www.antisyphontraining.com/pay-what-you-can/ This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots …