🔗 Lab Resources https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md 🔗 VM Download Instructions https://www.antisyphontraining.com/john-strand-training-lab-download-instructions/ 🔗 Pay What You Can (PWYC) Training Schedule https://www.antisyphontraining.com/pay-what-you-can/ This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots …
🔗 Lab Resources https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md 🔗 VM Download Instructions https://www.antisyphontraining.com/john-strand-training-lab-download-instructions/ 🔗 Pay What You Can (PWYC) Training Schedule https://www.antisyphontraining.com/pay-what-you-can/ This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots …
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/06/2024_06_05_anticast_How-to-Forge-Fake-News-and-Spawn-Flawless-Phisheries_Michael-Allen.pdf Anyone (and we mean anyone) can create perfect forgeries of trusted websites and use them to spread misinformation, conduct phishing attacks, or worse. In this webcast we explore the topic …
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_29_anticast_Realistic-End-to-End-Attacks-Detective-Controls_Jeff-McJunkin.pdf Jeff reveals the five ways outside attackers gain internal access and outlines three core defender objectives: Reducing initial access.Lowering detection and response time.Slowing down the attackers. Discover actionable insights through …
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_22_anticast_Offensive-Wireless-for-Red-Teams_Alex-Sanders.pdf In this expanded rendition of the Alex’s Offensive Summit talk ‘Wireless for Red Teams,’ he will broaden your understanding of wireless technologies and how to leverage them in red team …
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_15_anticast_Threat-Models-Landscape-and-Profiles-OH-MY_Wade-Wells.pdf This free one-hour Antisyphon Anti-cast with instructor Wade Wells offers an insightful overview of cyber threat landscaping, threat modeling, and threat profiling. Wade aims to equip attendees with the knowledge …
/// 🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_08_anticast_60min-Crash-Course-into-Infosec_Bill-McCauley.pdf 60min Crash Course into Infosec w/ Bill McCauley Join us for a one-hour Antisyphon Anti-cast with instructor Bill McCauley from Secure Ideas, as he dives into a high-level webapp pentest …
/// 🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/05/2024_05_01_anticast_Security-Split-Divorcing-Your-Stack_Alissa-Torres.pdf So your security team is convinced it needs to graduate to the newest “best” enterprise security tool, I get it. But for most, this type of architecture shift requires careful …
/// 🔗 Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium 🛝 Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/04/2024_04_24_anticast_Learning-from-Macedonia_How-InfoSec-Fails-Spawn-from-Sales-Marketing.pdf Learning from Macedonia: How InfoSec Fails Spawn from Sales & Marketing Join us for a free one-hour Antisyphon Anti-cast, with Kevin Johnson. Learn how exaggeration undermines trust and efficiency. Using …