🔗 Register for this Class – https://www.antisyphontraining.com/course/soc-core-skills-with-john-strand/?selected=soc-core-skills-with-john-strand Day 1 | SOC Core Skills with John Strand | Jan 2025 https://youtube.com/live/BbgGditShAg Day 2 | SOC Core Skills with John Strand | Jan 2025 THIS VIDEO Day 3 | SOC Core Skills with John Strand | Jan …
This Anti-Cast was originally aired on January 15, 2025. In this video, Tim Medin discusses the challenges and best practices of offensive and defensive security, emphasizing the importance of collaboration between red and blue teams. He covers a range of topics including password management, the …
🔗 Register for this Class – https://www.antisyphontraining.com/course/soc-core-skills-with-john-strand/?selected=soc-core-skills-with-john-strand This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. In a cybersecurity industry that is constantly changing and evolving, the need for a knowledgeable SOC analyst …
🔗 Register for this Class – https://www.antisyphontraining.com/course/soc-core-skills-with-john-strand/?selected=soc-core-skills-with-john-strand This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. In a cybersecurity industry that is constantly changing and evolving, the need for a knowledgeable SOC analyst …
🔗 Register for this Class – https://www.antisyphontraining.com/course/soc-core-skills-with-john-strand/?selected=soc-core-skills-with-john-strand This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. In a cybersecurity industry that is constantly changing and evolving, the need for a knowledgeable SOC analyst …
🔗 Register for this Class – https://www.antisyphontraining.com/course/soc-core-skills-with-john-strand/?selected=soc-core-skills-with-john-strand This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. In a cybersecurity industry that is constantly changing and evolving, the need for a knowledgeable SOC analyst …
🔗 Register for Infosec Webcasts, Anti-casts & Summits. – https://poweredbybhis.com Cloud computing has been the norm for more than a decade. Has it been a decade already?! Wow… Join us in this free one-hour Antisyphon Anti-cast with instructor, Andrew Krug, to talk through how you …
🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com Over the last year and a half, Michael Allen, of Black Hills Information Security, has run the same social engineering attack over and over against all sorts of well-defended organizations: Adversary-in-the-Middle phishing through the U.S. mail. …
00:00 – Welcome! 00:06 – Zach H. – Are bug bounty programs effective? 01:09 – John S. – Bug bounty VS full product analysis – use issue tracker for 3rd party code, libraries 02:29 – Zach H. – Bug bounties VS full-time analyst. Community-based. 03:15 …
In this video, Kent Ickler and Jordan Drysdale discuss the intricacies of designing job functionality and functional security, focusing on least privilege principles within Active Directory environments.