Anti-Cast: How to Strengthen M365 Exchange Online Configurations with Kevin Klingbile
Join instructor Kevin Klingbile to learn how attackers exploit weak mail flow rules and how to stop them.
Join instructor Kevin Klingbile to learn how attackers exploit weak mail flow rules and how to stop them.
Join Eric Kuehn, Principal Security Consultant at Secure Ideas, for a free one-hour training session that takes a deep dive into the security enhancements Microsoft has introduced to Active Directory over the past few years and how they are reshaping the way penetration testers and defenders operate.
Join AI researchers Brian Fehrman and Derek Banks for a free one-hour training session that breaks down the OWASP Top 10 AI-LLM risks clearly and practically.
Join Patterson Cake, Black Hills Infosec Director of Incident Response, for a technical session outlining a prioritized approach to endpoint investigations, focusing on where and how unauthorized access and activity impact Windows and Linux.
Summit: March 25 @ 10:00 am – 4:00 pm EDT Live Training: March 26 – April 10 Security Operations Centers are where defenders grow, pressure is real, and impact matters. The Antisyphon Training SOC Summit is a free, 6-hour, live virtual event designed to give ...
In this 25-minute technical presentation, Seth Williams will walk through hands-on email forensics using Sublime Security’s free EML Analyzer, teaching you how to break down raw email files to uncover the true mechanics of phishing, malware delivery, and social engineering attacks.
