🔗 Register for this Class – https://www.antisyphontraining.com/course/soc-core-skills-with-john-strand/?selected=soc-core-skills-with-john-strand Day 1 | SOC Core Skills with John Strand | Jan 2025 https://youtube.com/live/BbgGditShAg Day 2 | SOC Core Skills with John Strand | Jan 2025 THIS VIDEO Day 3 | SOC Core Skills with John Strand | Jan …
This Anti-Cast was originally aired on January 15, 2025. In this video, Tim Medin discusses the challenges and best practices of offensive and defensive security, emphasizing the importance of collaboration between red and blue teams. He covers a range of topics including password management, the …
🔗 Register for this Class – https://www.antisyphontraining.com/course/soc-core-skills-with-john-strand/?selected=soc-core-skills-with-john-strand This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. In a cybersecurity industry that is constantly changing and evolving, the need for a knowledgeable SOC analyst …
🔗 Register for this Class – https://www.antisyphontraining.com/course/soc-core-skills-with-john-strand/?selected=soc-core-skills-with-john-strand This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. In a cybersecurity industry that is constantly changing and evolving, the need for a knowledgeable SOC analyst …
🔗 Register for this Class – https://www.antisyphontraining.com/course/soc-core-skills-with-john-strand/?selected=soc-core-skills-with-john-strand This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. In a cybersecurity industry that is constantly changing and evolving, the need for a knowledgeable SOC analyst …
🔗 Register for this Class – https://www.antisyphontraining.com/course/soc-core-skills-with-john-strand/?selected=soc-core-skills-with-john-strand This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. In a cybersecurity industry that is constantly changing and evolving, the need for a knowledgeable SOC analyst …
n this video, Patterson Cake discusses the critical issue of business email compromise (BEC) and its implications on small to medium businesses. He shares real-life examples of how BEC has led to significant financial losses and the common tactics used by threat actors, such as phishing and identity theft.
🔗 Register for Infosec Webcasts, Anti-casts & Summits. – https://poweredbybhis.com Cloud computing has been the norm for more than a decade. Has it been a decade already?! Wow… Join us in this free one-hour Antisyphon Anti-cast with instructor, Andrew Krug, to talk through how you …
🔗 Register for webcasts, summits, and workshops – https://poweredbybhis.com Over the last year and a half, Michael Allen, of Black Hills Information Security, has run the same social engineering attack over and over against all sorts of well-defended organizations: Adversary-in-the-Middle phishing through the U.S. mail. …
In this video, Amanda and Zach discuss the challenges and solutions for cybersecurity in small and medium-sized businesses (SMBs) and managed service providers (MSPs).