BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Antisyphon Training - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.antisyphontraining.com
X-WR-CALDESC:Events for Antisyphon Training
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20270314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20271107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Denver
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20240310T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20241103T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20250309T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20251102T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20260308T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20261101T080000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T113000
DTEND;TZID=America/New_York:20260325T115500
DTSTAMP:20260425T225412
CREATED:20260122T211406Z
LAST-MODIFIED:20260123T171713Z
UID:10000881-1774438200-1774439700@www.antisyphontraining.com
SUMMARY:SOC Summit Talk: Augmented Detection Engineering
DESCRIPTION:With Wade Wells \n\n\n\n\n\n\n\nDo you understand where AI can safely support the detection lifecycle? \nJoin Wade Wells (Staff Detection & Response Engineer) for a 25-minute\, conversational walk-through of how AI can boost every part of the detection lifecycle\, from generating new detection ideas and tightening logic to evaluating coverage\, finding blind spots\, and automating documentation. \n\n\n\n\n\nThis talk shows practical ways AI can brainstorm attack paths\, tighten detections\, translate logic\, surface logging gaps\, and draft documentation\, such as playbooks and detection cards\, so engineers can focus on precision and strategy. \nWade will focus on real\, usable techniques\, not hype\, showing what AI can safely augment and how to build a modern\, AI-assisted detection workflow. \n\n\n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow SOC Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training SOC Summit\, a free\, 6-hour\, live virtual event designed to give you an honest\, practical look at what it’s really like to work in a SOC. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available March 26-April 10 to help you deepen your skills and become more effective at protecting what matters most. \n\n\n\n\nLearn more about the SOC Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nWade Wells\n\n\n\n\nBio\n\n\n\nWade Wells is the Lead Detection Engineer for a Fortune 30 financial company. He has worked for eight years in security operations\, performing threat hunting\, cyber threat intelligence\, and detection engineering\, primarily in the financial sector. ​Active in the cybersecurity community\, Wade frequently speaks at prominent industry events and is involved with several security-focused organizations. \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/soc-summit-talk-augmented-detection-engineering/
CATEGORIES:Artificial Intelligence,Blue Team,SOC
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Talk_Augmented-Detection-Engineering_Wade-Wells.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T110000
DTEND;TZID=America/New_York:20260325T112500
DTSTAMP:20260425T225412
CREATED:20260122T211157Z
LAST-MODIFIED:20260123T175008Z
UID:10000880-1774436400-1774437900@www.antisyphontraining.com
SUMMARY:SOC Summit Talk: Using Pentest Findings to Improve Detections
DESCRIPTION:With Ashley Knowles \n\n\n\n\n\n\n\nAre your pentest reports actually helping you make your detections better? \n\n\n\nPenetration tests reveal more than exploited or identified vulnerabilities. They can also expose blind spots in visibility and detections. \n\n\n\nJoin Ashley Knowles\, a Black Hills InfoSec Security Consultant\, for a 25-minute technical presentation where she will draw on real-world penetration testing experience to help you close coverage gaps. \n\n\n\nYou’ll learn how to turn penetration test findings into actionable improvements for alerting\, coverage\, and detections. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow SOC Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training SOC Summit\, a free\, 6-hour\, live virtual event designed to give you an honest\, practical look at what it’s really like to work in a SOC. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available March 26-April 10 to help you deepen your skills and become more effective at protecting what matters most. \n\n\n\n\nLearn more about the SOC Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nAshley Knowles\n\n\n\n\nBio\n\n\n\nAshley Knowles joined Black Hills Information Security (BHIS) in Fall 2021. As a Security Consultant\, Ashley’s role is to perform network (internal/external)\, social engineering\, and cloud penetration tests\, as well as participating in red team assessments. Since joining the infosec community in 2013\, she has developed and taught hacking classes\, worked as a security consultant\, and been a team lead on a red team. Ashley serves as a mentor at a local high school’s cybersecurity class and\, as someone who loves to learn and teach\, she looks forward to developing and teaching classes that add to BHIS’s educational catalogue. In her free time\, Ashely enjoys photography\, hiking and exploring new places with her kids\, and building Legos. \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/soc-summit-talk-using-pentest-findings-to-improve-detections/
CATEGORIES:Blue Team,Pentesting,SOC
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Talk_Using-Pentest-Findings-to-Improve-Detections_Ashley-Knowles.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T103000
DTEND;TZID=America/New_York:20260325T105500
DTSTAMP:20260425T225412
CREATED:20260122T211538Z
LAST-MODIFIED:20260123T174935Z
UID:10000879-1774434600-1774436100@www.antisyphontraining.com
SUMMARY:SOC Summit Talk: Practical Email Forensics with EML Analyzer
DESCRIPTION:With Seth Williams \n\n\n\n\n\n\n\nWhen you’re handed a suspicious email\, how do you investigate what it is really doing? \n\n\n\nIn this 25-minute technical presentation\, Seth Williams will walk through hands-on email forensics using Sublime Security’s free EML Analyzer\, teaching you how to break down raw email files to uncover the true mechanics of phishing\, malware delivery\, and social engineering attacks. \n\n\n\nYou’ll learn how to quickly review headers\, authentication results\, URLs\, attachments\, and metadata to validate detections\, explain why an email is dangerous\, and confidently decide when to escalate or close alerts and user reports. \n\n\n\nSharpen your email analysis skills and improve triage with evidence-based investigations. \n\n\n\nEML Analyzer – Sublime Security \n\n\n\nWe invited Seth and Sublime Security to present because their free tool can help you improve your suspicious email investigations today. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow SOC Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training SOC Summit\, a free\, 6-hour\, live virtual event designed to give you an honest\, practical look at what it’s really like to work in a SOC. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available March 26-April 10 to help you deepen your skills and become more effective at protecting what matters most. \n\n\n\n\nLearn more about the SOC Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nSeth Williams\n\n\n\n\nBio\n\n\n\nSeth Williams is the Global Partner CTO at Sublime Security\, where he builds and scales partner ecosystems across MSSPs\, VARs\, GSIs\, and technical alliances\, helping partners and customers achieve real-world security outcomes. With a career that spans federal and commercial security architecture\, large-scale SIEM operations\, professional services leadership\, and security strategy\, Seth brings a practical understanding of how security actually works in the field. He focuses on clear technical alignment\, cutting through complexity\, and turning advanced security capabilities into straightforward\, dependable solutions that partners can deliver confidently. \n\n\n\n\n\n\n\n\n\n\n\n\n  \n\n\n\n 
URL:https://www.antisyphontraining.com/event/soc-summit-talk-practical-email-forensics-with-eml-analyzer/
CATEGORIES:Blue Team,Forensics,SOC
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Talk_Practical-Email-Forensics-with-EML-Analyzer_Seth-Williams.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260325T100000
DTEND;TZID=America/New_York:20260325T102500
DTSTAMP:20260425T225412
CREATED:20260122T211713Z
LAST-MODIFIED:20260123T174952Z
UID:10000878-1774432800-1774434300@www.antisyphontraining.com
SUMMARY:SOC Summit Talk: Needle Hunting: An Endpoint Investigation Cheat Sheet
DESCRIPTION:With Patterson Cake \n\n\n\n\n\n\n\nHow do you investigate – let alone understand – an endpoint operating system with more than 50 million lines of code? \n\n\n\nJoin Patterson Cake\, Black Hills Infosec Director of Incident Response\, for a technical session outlining a prioritized approach to endpoint investigations\, focusing on where and how unauthorized access and activity impact Windows and Linux. \n\n\n\nYou’ll learn about the endpoint “attack surface\,” prioritization of operating-system artifact selection\, suggested workflow for artifact acquisition\, and a methodology for identification of indicators of compromise. \n\n\n\n\nRegister Here\n\n\n\n\nChat with your fellow SOC Summit attendees in the Antisyphon Discord server: https://discord.gg/antisyphon \n\n\n\n\n\n This talk is part of the Antisyphon Training SOC Summit\, a free\, 6-hour\, live virtual event designed to give you an honest\, practical look at what it’s really like to work in a SOC. \n\n\n\nFor those who want to go further\, multiple hands-on\, high-quality\, and affordable training courses are available March 26-April 10 to help you deepen your skills and become more effective at protecting what matters most. \n\n\n\nPatterson Cake will be teaching his Incident Response Simplified class on April 3. \n\n\n\n\nLearn more about the SOC Summit\n\n\n\n\nSee the entire Antisyphon Training Course Catalog for affordable cybersecurity training!  \n\n\n\n\n\n\n\nAbout the Instructor\n\n\n\nPatterson Cake\n\n\n\n\nBio\n\n\n\nPatterson Cake joined the Black Hills Information Security (BHIS) pirate ship in June of 2023 as a Security Analyst focusing primarily on detection engineering and digital forensics and incident response. He chose BHIS because\, to paraphrase\, “doing cool stuff with cool people” and “making the world a better/safer place” is exactly how he wants to spend his professional time and energy. It also helps that he has a bit of history with a couple of awesome folks that have been with BHIS for many moons. Prior to joining the team\, Patterson helped build and lead a DFIR practice for an MSSP\, worked as a senior security engineer for AWS Managed Services\, and spent several years in enterprise cybersecurity\, often healthcare related\, focusing on intermingling offensive security and incident response in technical and leadership roles. Outside of work\, he enjoys spending time with his family\, which often involves motorcycles\, outdoor sports\, movies\, and music. \n\n\n\n\n\n\n\n\n\n\n\n\n 
URL:https://www.antisyphontraining.com/event/soc-summit-talk-needle-hunting-an-endpoint-investigation-cheat-sheet/
CATEGORIES:Blue Team,Incident Response,SOC
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2026/01/Talk_Needle-Hunting-An-Endpoint-Investigation-Cheat-Sheet_Patterson-Cake.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260316T100000
DTEND;TZID=America/New_York:20260317T180000
DTSTAMP:20260425T225412
CREATED:20260223T065621Z
LAST-MODIFIED:20260313T155508Z
UID:10000919-1773655200-1773770400@www.antisyphontraining.com
SUMMARY:Attacking\, Defending\, and Leveraging AI-LLM Systems
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/attacking-defending-and-leveraging-ai-llm-systems/
CATEGORIES:Artificial Intelligence,Blue Team,LLM,Red Team
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260306T120000
DTEND;TZID=America/New_York:20260306T160000
DTSTAMP:20260425T225412
CREATED:20260127T162525Z
LAST-MODIFIED:20260224T233756Z
UID:10000890-1772798400-1772812800@www.antisyphontraining.com
SUMMARY:Workshop: Hacking AI-LLM Applications
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/workshop-hacking-ai-llm-applications/
CATEGORIES:Artificial Intelligence,Blue Team,Pay What You Can,Workshop
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260223T120000
DTEND;TZID=America/New_York:20260226T160000
DTSTAMP:20260425T225412
CREATED:20251202T211744Z
LAST-MODIFIED:20260218T210801Z
UID:10000859-1771848000-1772121600@www.antisyphontraining.com
SUMMARY:Cybersecurity Foundations
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/cybersecurity-foundations-1/
CATEGORIES:Blue Team,Fundamentals,Mitre Att&ck,Pay What You Can
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260119T120000
DTEND;TZID=America/New_York:20260122T160000
DTSTAMP:20260425T225412
CREATED:20251202T212719Z
LAST-MODIFIED:20260406T205501Z
UID:10000860-1768824000-1769097600@www.antisyphontraining.com
SUMMARY:Active Defense and Cyber Deception with John Strand
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/active-defense-and-cyber-deception-with-john-strand-5/
CATEGORIES:Blue Team,Featured,Pay What You Can
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20251202T100000
DTEND;TZID=America/New_York:20251203T180000
DTSTAMP:20260425T225412
CREATED:20251107T161419Z
LAST-MODIFIED:20251202T185957Z
UID:10000854-1764669600-1764784800@www.antisyphontraining.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK with John Strand
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/getting-started-in-security-with-bhis-and-mitre-attck-with-john-strand-6/
CATEGORIES:Blue Team,Fundamentals,Mitre Att&ck,Pay What You Can
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20251020T110000
DTEND;TZID=America/New_York:20251023T160000
DTSTAMP:20260425T225412
CREATED:20250325T214020Z
LAST-MODIFIED:20250905T173353Z
UID:10000759-1760958000-1761235200@www.antisyphontraining.com
SUMMARY:SOC Core Skills with John Strand
DESCRIPTION: \n \n \n \n \n \n \n 
URL:https://www.antisyphontraining.com/event/soc-core-skills-with-john-strand-3/
CATEGORIES:Blue Team,Fundamentals,Pay What You Can,SOC
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20251007T083000
DTEND;TZID=America/Denver:20251008T170000
DTSTAMP:20260425T225412
CREATED:20250217T171344Z
LAST-MODIFIED:20250305T140023Z
UID:10000733-1759825800-1759942800@www.antisyphontraining.com
SUMMARY:Securing the Cloud: Foundations with Andrew Krug
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/securing-the-cloud-foundations-with-andrew-krug/
CATEGORIES:Blue Team,Cloud
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20251007T083000
DTEND;TZID=America/Denver:20251008T170000
DTSTAMP:20260425T225412
CREATED:20250217T171055Z
LAST-MODIFIED:20250305T140449Z
UID:10000729-1759825800-1759942800@www.antisyphontraining.com
SUMMARY:Ransomware Attack Simulation and Investigation for Blue Teamers with Markus Schober
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/ransomware-attack-simulation-and-investigation-for-blue-teamers-with-markus-schober-5/
CATEGORIES:Blue Team,Ransomware
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20251007T083000
DTEND;TZID=America/Denver:20251008T170000
DTSTAMP:20260425T225412
CREATED:20250217T170729Z
LAST-MODIFIED:20250305T140706Z
UID:10000726-1759825800-1759942800@www.antisyphontraining.com
SUMMARY:Offense for Defense with Jason Downey and Tim Medin
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/offense-for-defense-with-jason-downey-and-tim-medin-5/
CATEGORIES:Blue Team,Purple Team,Red Team
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20251007T083000
DTEND;TZID=America/Denver:20251008T170000
DTSTAMP:20260425T225412
CREATED:20250217T170037Z
LAST-MODIFIED:20250305T141212Z
UID:10000721-1759825800-1759942800@www.antisyphontraining.com
SUMMARY:Foundations in Space Cybersecurity: Hardware Edition with Tim Fowler
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/foundations-in-space-cybersecurity-hardware-edition-with-tim-fowler/
CATEGORIES:Blue Team,Featured,Space Systems
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20251007T083000
DTEND;TZID=America/Denver:20251008T170000
DTSTAMP:20260425T225412
CREATED:20250217T165940Z
LAST-MODIFIED:20250305T141248Z
UID:10000720-1759825800-1759942800@www.antisyphontraining.com
SUMMARY:Defending M365 & Azure with Kevin Klingbile
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/defending-m365-azure-with-kevin-klingbile-2/
CATEGORIES:Blue Team
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250828T090000
DTEND;TZID=America/New_York:20250829T180000
DTSTAMP:20260425T225412
CREATED:20250422T192120Z
LAST-MODIFIED:20250627T194525Z
UID:10000782-1756371600-1756490400@www.antisyphontraining.com
SUMMARY:Active Directory Security and Hardening with Jordan Drysdale and Kent Ickler
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/active-directory-security-and-security-hardening-with-jordan-drysdale-and-kent-ickler/
CATEGORIES:Blue Team,Red Team
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250828T090000
DTEND;TZID=America/New_York:20250829T180000
DTSTAMP:20260425T225412
CREATED:20250422T173943Z
LAST-MODIFIED:20250825T170939Z
UID:10000777-1756371600-1756490400@www.antisyphontraining.com
SUMMARY:Defending M365 & Azure with Kevin Klingbile
DESCRIPTION: 
URL:https://www.antisyphontraining.com/event/defending-m365-azure-with-kevin-klingbile-3/
CATEGORIES:Blue Team
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250828T090000
DTEND;TZID=America/New_York:20250829T180000
DTSTAMP:20260425T225412
CREATED:20250422T173428Z
LAST-MODIFIED:20250429T121803Z
UID:10000776-1756371600-1756490400@www.antisyphontraining.com
SUMMARY:Offense for Defense with Tim Medin
DESCRIPTION: 
URL:https://www.antisyphontraining.com/event/offense-for-defense-with-jason-downey-and-tim-medin-6/
CATEGORIES:Blue Team,Purple Team,Red Team
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250828T090000
DTEND;TZID=America/New_York:20250828T180000
DTSTAMP:20260425T225412
CREATED:20250422T174547Z
LAST-MODIFIED:20250422T214858Z
UID:10000778-1756371600-1756404000@www.antisyphontraining.com
SUMMARY:Cyber Threat Intelligence 101 with Wade Wells
DESCRIPTION: 
URL:https://www.antisyphontraining.com/event/cyber-threat-intelligence-101-with-wade-wells/
CATEGORIES:Blue Team
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20250827T080000
DTEND;TZID=America/Denver:20250827T170000
DTSTAMP:20260425T225412
CREATED:20250422T170257Z
LAST-MODIFIED:20250822T133709Z
UID:10000760-1756281600-1756314000@www.antisyphontraining.com
SUMMARY:Blue Team Summit
DESCRIPTION:Summit: \n\n\n\n\nAugust 27 @ 11:00 am – 4:00 pm EDT \n\n\n\n\n\nLive Training: \n\n\n\nAugust 28 @ 9:00 am – August 29 6:00 pm EDT \n\n\n\n\n\n\n\n\n\nREGISTER FOR SUMMIT ONLY\n\n\n\nREGISTER FOR LIVE TRAINING\n\n\n\n\n\n\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nWe see you Blue Team.  \n\n\n\nYou wake up everyday and wonder\, “what’s it going to be today?”  \n\n\n\nLet’s gather together and share our joys\, frustrations\, reflections on the past\, and hopes for the future.  \n\n\n\n\n\n\n\n\n\nWednesday: A five-hour Virtual Summit \n\n\n\nThursday & Friday: Two days of hands-on\, high-quality cybersecurity training. \n\n\n\n\n\n\n\n\n\n\n\n\nThis is a five-hour virtual event where we’ll all figure out: what’s working\, what could work if we had stakeholder buy-in\, and what in the heck might be coming next for us to plan for. \n\n\n\nWe’re all in this together!  \n\n\n\n\n\n\n\n\n\nTake Your Learning Further with LIVE Hands-On Training \n\n\n\nTraining Classes Include: \n\n\n\n\n\n\n\n\n\n\n\n\nRegister Now!\n\n\n\n\n\n\n\nOffense for Defense with Tim Medin \n\n\n\nDate: August 28-29\, 2025 Time: 9 AM – 6 PM EDT \n\n\n\nA specialized course tailored for information security blue teamers\, or defenders\, aiming to fortify their skills in offensive security strategies. Throughout this program\, participants will delve into the fundamentals of offensive security\, gaining insight into the tactics\, techniques\, and procedures employed by adversaries. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nRegister Now!\n\n\n\n\n\n\n\nDefending M365 & Azure with Kevin Klingbile \n\n\n\nDate: August 28-29\, 2025 Time: 9 AM – 6 PM EDT \n\n\n\nThis class is designed to be an introduction to M365 and Azure security strategies. This course will equip IT professionals with the knowledge and skills needed to defend Azure and Microsoft 365 environments effectively. We will cover cloud security measures and common misconfigurations. In addition\, Red Teamers will learn to identify common attack surfaces within their client’s environments. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nRegister Now!\n\n\n\n\n\n\n\nCyber Threat Intelligence 101 with Wade Wells \n\n\n\nDate: August 28\, 2025 Time: 9 AM – 6 PM EDT \n\n\n\nThis comprehensive course on Threat Intelligence Management is designed for cybersecurity professionals who aspire to master the art of analyzing and mitigating cyber threats effectively. The curriculum covers a broad spectrum of topics from the foundational concepts of threat intelligence to advanced applications in various organizational contexts. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nRegister Now!\n\n\n\n\n\n\n\nActive Directory Security and Hardening with Jordan Drysdale and Kent Ickler \n\n\n\nDate: August 28-29\, 2025 Time: 9 AM – 6 PM EDT \n\n\n\nThis hands-on course is built for defenders who want to understand\, audit\, and harden AD from the inside out. Students will work directly in a lab environment to identify misconfigurations\, analyze attack paths\, implement defensive controls\, and apply industry best practices to reduce risk.  \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nRegister Now!\n\n\n\n\n\n\n\nNetwork Forensics and Incident Response with Troy Wojewoda \n\n\n\nDate: August 28-29\, 2025 Time: 9 AM – 6 PM EDT \n\n\n\nThis course covers incident handling fundamentals\, attacker methodologies\, network protocol abuse detection\, hands-on network packet analysis\, Zeek scripting\, flow data analysis\, and real-world attack scenarios. This course uses an assortment of network data acquisition tools and techniques with a focus on open-source\, vendor-neutral solutions. Students who take this course will learn how to perform network traffic and protocol analysis that ultimately supports cybersecurity incident response efforts. \n\n\n\n\n\n\nWhy Attend Antisyphon Training Events?Antisyphon Training Summits are built on a commitment to fostering community and engagement. Our events encourage connections between attendees\, instructors\, and industry leaders. Join us to learn\, collaborate\, and grow your network in the cybersecurity community. \n\n\n\n\n\nSummit Dates & Times\n\n\n\n\n\nWednesday\, August 27\, 2025 \n\n\n\n\n\n11:00 AM To 4:00 PM EDT \n\n\n\n\n\nClass Dates & Times\n\n\n\n\n\nThursday\, August 28\, 2025 \n\n\n\n\n\n9:00 AM To 6:00 PM EDT \n\n\n\n\n\n\n\nFriday\, August 29\, 2025 \n\n\n\n\n\n10:00 AM To 6:00 PM EDT
URL:https://www.antisyphontraining.com/event/blue-team-summit/
CATEGORIES:Blue Team,Summit
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2025/04/BlueTeamPOSTER.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250818T110000
DTEND;TZID=America/New_York:20250821T160000
DTSTAMP:20260425T225412
CREATED:20250709T191317Z
LAST-MODIFIED:20250709T191317Z
UID:10000802-1755514800-1755792000@www.antisyphontraining.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK with John Strand
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/getting-started-in-security-with-bhis-and-mitre-attck-with-john-strand-5/
CATEGORIES:Blue Team,Fundamentals,Mitre Att&ck,Pay What You Can
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250731T110000
DTEND;TZID=America/New_York:20250731T160000
DTSTAMP:20260425T225412
CREATED:20250709T193308Z
LAST-MODIFIED:20250714T172759Z
UID:10000803-1753959600-1753977600@www.antisyphontraining.com
SUMMARY:Workshop: Foundational Application Security Training with Bill McCauley
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/workshop-foundational-application-security-training-with-bill-mccauley-2/
CATEGORIES:Blue Team,Pay What You Can,Workshop
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250718T110000
DTEND;TZID=America/New_York:20250718T160000
DTSTAMP:20260425T225412
CREATED:20250710T181529Z
LAST-MODIFIED:20250714T195438Z
UID:10000804-1752836400-1752854400@www.antisyphontraining.com
SUMMARY:Workshop: SOC Detection Engineering Crash Course with Hayden Covington
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/workshop-soc-detection-engineering-crash-course-with-hayden-covington-2/
CATEGORIES:Blue Team,Pay What You Can,SOC,Workshop
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250616T110000
DTEND;TZID=America/New_York:20250619T160000
DTSTAMP:20260425T225412
CREATED:20250314T163654Z
LAST-MODIFIED:20250609T201120Z
UID:10000749-1750071600-1750348800@www.antisyphontraining.com
SUMMARY:Active Defense and Cyber Deception with John Strand
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/active-defense-and-cyber-deception-with-john-strand-3/
CATEGORIES:Blue Team,Featured,Pay What You Can
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250512T110000
DTEND;TZID=America/New_York:20250515T160000
DTSTAMP:20260425T225412
CREATED:20241205T195049Z
LAST-MODIFIED:20250509T165348Z
UID:10000677-1747047600-1747324800@www.antisyphontraining.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK with John Strand
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/getting-started-in-security-with-bhis-and-mitre-attck-with-john-strand-3/
CATEGORIES:Blue Team,Fundamentals,Mitre Att&ck,Pay What You Can
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250407T110000
DTEND;TZID=America/New_York:20250410T160000
DTSTAMP:20260425T225412
CREATED:20241205T202453Z
LAST-MODIFIED:20250410T161323Z
UID:10000678-1744023600-1744300800@www.antisyphontraining.com
SUMMARY:SOC Core Skills with John Strand
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/soc-core-skills-with-john-strand-2/
CATEGORIES:Blue Team,Fundamentals,Pay What You Can,SOC
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250324T110000
DTEND;TZID=America/New_York:20250327T160000
DTSTAMP:20260425T225412
CREATED:20241205T190914Z
LAST-MODIFIED:20250326T023601Z
UID:10000676-1742814000-1743091200@www.antisyphontraining.com
SUMMARY:Active Defense and Cyber Deception with John Strand
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/active-defense-and-cyber-deception-with-john-strand-2/
CATEGORIES:Blue Team,Featured,Pay What You Can
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250320T090000
DTEND;TZID=America/New_York:20250321T180000
DTSTAMP:20260425T225412
CREATED:20250113T201724Z
LAST-MODIFIED:20250320T123448Z
UID:10000697-1742461200-1742580000@www.antisyphontraining.com
SUMMARY:Foundations in Space Cybersecurity with Tim Fowler
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/introduction-to-cybersecurity-in-space-systems-with-tim-fowler-4/
CATEGORIES:Blue Team,Featured,Space Systems
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250320T090000
DTEND;TZID=America/New_York:20250321T180000
DTSTAMP:20260425T225412
CREATED:20250107T165748Z
LAST-MODIFIED:20250320T122848Z
UID:10000690-1742461200-1742580000@www.antisyphontraining.com
SUMMARY:Defending M365 & Azure with Kevin Klingbile
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/defending-m365-azure-with-kevin-klingbile/
CATEGORIES:Blue Team
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250314T110000
DTEND;TZID=America/New_York:20250314T160000
DTSTAMP:20260425T225412
CREATED:20250221T174054Z
LAST-MODIFIED:20250312T190354Z
UID:10000735-1741950000-1741968000@www.antisyphontraining.com
SUMMARY:Workshop: Foundational Application Security Training with Bill McCauley
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/workshop-foundational-application-security-training-fast-with-bill-mccauley/
CATEGORIES:Blue Team,Pay What You Can,Workshop
END:VEVENT
END:VCALENDAR