π Lab Resources https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md π VM Download Instructions https://www.antisyphontraining.com/john-strand-training-lab-download-instructions/ π Pay What You Can (PWYC) Training Schedule https://www.antisyphontraining.com/pay-what-you-can/ This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots …
In this video, the speakers discuss the complex and dynamic topic of cybersecurity. They explore various security challenges and the latest strategies for protecting digital assets.
/// π Register for webcasts, summits, and workshops – https://blackhillsinfosec.zoom.us/ze/hub/stadium π Webcast Slides – https://www.antisyphontraining.com/wp-content/uploads/2024/06/2024_06_12_anticast_What-Game-of-Thrones-Can-Teach-Us-About-Cybersecurity_Dr-Gerald.pdf What Game of Thrones Can Teach Us About Cybersecurity with Dr. Gerald Auger In a realm where threats loom at every corner, where trust is a currency, and where the …
In this video, Kent and Jordan discuss effective practices for securing Active Directory and preventing common penetration testing exploits. They explore techniques like establishing strong password policies, disabling outdated protocols, and implementing system monitoring to enhance security.
π Lab Resources https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md π VM Download Instructions https://www.antisyphontraining.com/john-strand-training-lab-download-instructions/ π Pay What You Can (PWYC) Training Schedule https://www.antisyphontraining.com/pay-what-you-can/ This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots …
π Lab Resources https://github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/navigation.md π VM Download Instructions https://www.antisyphontraining.com/john-strand-training-lab-download-instructions/ π Pay What You Can (PWYC) Training Schedule https://www.antisyphontraining.com/pay-what-you-can/ This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots …
In this video, the speakers discuss the powerful capabilities of the ELK stack (Elasticsearch, Logstash, and Kibana) for handling and analyzing Sysmon logs to improve cybersecurity measures.
In this video, the speaker discusses their journey and insights into the field of computer security, emphasizing the importance of foundational knowledge and hands-on experience. They detail their career progression, from initial roles in technical support to specialized positions in security, highlighting key learning moments and decisions.
In this video, the speakers discuss the effectiveness and accessibility of free and open-source Endpoint Detection and Response (EDR) tools. They explore the recent developments in the space, highlighting how these tools are now more accessible to smaller organizations due to their cost-effectiveness.
In this video, John and Bill discuss setting up and utilizing a home lab for security testing and experimentation. They cover the importance of a controlled environment for safely running malicious software and testing security tools, illustrating how to configure network isolation and capturing traffic for analysis.