Active Defense & Cyber Deception w/ John Strand
July 15 @ 11:00 am – July 18 @ 4:00 pm EDT
Instructor: John Strand
Course Length: 16 Hours
|11:00 AM – 4:00 PM*
|12:00 PM – 4:00 PM
|12:00 PM – 4:00 PM
|12:00 PM – 4:00 PM
All times are Eastern.
*Please note, tuition assistance registration closes on July 13 at 10 p.m. ET.
Active Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between.
In this class, you will learn how to force an attacker to take more moves to attack your network. These moves may increase your ability to detect them. You will learn how to gain better attribution as to who is attacking you and why. You will also find out how to get access to a bad guy’s system. And most importantly, you will find out how to do the above legally.
The current threat landscape is shifting. Traditional defenses are failing us. We need to develop new strategies to defend ourselves. Even more importantly, we need to better understand who is attacking us and why. Some of the things we talk about you may implement immediately, others may take you a while to implement. Either way, consider what we discuss as a collection of tools at your disposal when you need them to annoy attackers, attribute who is attacking you, and finally, attack the attackers.
This class is based on the DARPA funded Active Defense Harbinger Distribution live Linux environment. This VM is built from the ground up for defenders to quickly implement Active Defenses in their environments. This class is also very heavy with hands-on labs. We will not just talk about Active Defenses. We will be doing hands-on labs and through them in a way that can be quickly and easily implemented in your environment.
- Lots of open-source tools that can be freely and easily configured in your environment.
- A better understanding of current legal landscapes.
- An approach for developing enterprise integrations.
- WHO SHOULD TAKE THIS COURSE
- General security practitioners
- Penetration testers
- Ethical hackers
- Web application developers
- Website designers and architects
Audience Skill Level
- Stable Internet access
- x86 architecture CPU clocked at 2 GHz or higher that is capable of nested virtualization
(Apple Silicon is currently not supported)
- A computer with at least 8 GB of RAM. 16 GB is recommended
- VMWare Workstation or VMWare Fusion
(VirtualBox and other VM software is not supported)
- Windows 10/11, MacOSX+, or a currently supported Linux Distribution
- Full Administrator/root access to your computer or laptop
What Each Student Should Bring
A laptop and a smile!
About Antisyphon Training Options
Learn via live stream from instructors that are in the field utilizing the techniques they teach. Classes are split into four training days that are each four hours long. Live Online training includes six months access to dedicated class channels in the Antisyphon Discord server, six months access to live class recordings, a certificate of participation, and 12 months complimentary access to the Antisyphon Cyber Range.
Learn at your own pace with access to course content, lectures, and demos in the Antisyphon On-demand learning platform. Most courses are offered with lifetime access to the course and content updates. All On-demand courses include content update alerts, access to dedicated support channels in the Antisyphon Discord server, a certificate of participation, and 12 months complimentary access to the Antisyphon Cyber Range.
Pay-What-You-Can and Cyber Range Access
Cyber Range access varies depending on payment level.
|Cyber Range Access
|Less than $295
|No Cyber Range Access
|Six Months Cyber Range Access
|Full Price – $575
|Twelve Months Cyber Range Access
Trainer & Author
John Strand has consulted and taught thousands of classes and hundreds of organizations in the areas of security, regulatory compliance, and penetration testing. He is a coveted speaker and much-loved former SANS instructor and course author. John is a contributor to the industry shaping Penetration Testing Execution Standard and 20 Critical Security Controls frameworks.
In 2008, John founded Black Hills Information Security (BHIS), a pentesting company that strives to understand its clients from a holistic perspective, emphasizing collaboration and education over stunt hacking. Since then, BHIS has grown to become a “tribe of companies” that includes Antisyphon Infosec Training, Active Countermeasures (ACM), Wild West Hackin’ Fest (WWHF), and more!