Anti-Cast: Threat Hunting Malware Communication over DNS with Faan Rossouw
Join instructor Faan Rossouw for a free one-hour training on hunting malware that uses DNS as a covert communication channel.
Join instructor Faan Rossouw for a free one-hour training on hunting malware that uses DNS as a covert communication channel.
Join instructor Mishaal Khan for a free one-hour hands-on training session, where you'll navigate real-world scenarios and build an investigation mind map, incorporating email addresses, phone numbers, Google Maps, APIs, and online form abuse.
Join Hayden Covington (Black Hills Infosec - SOC SecOps Lead) for a free one-hour training session to learn how to augment security analysts with AI through practical, tested workflows.
Join instructor Kevin Klingbile to learn how attackers exploit weak mail flow rules and how to stop them.
Join Eric Kuehn, Principal Security Consultant at Secure Ideas, for a free one-hour training session that takes a deep dive into the security enhancements Microsoft has introduced to Active Directory over the past few years and how they are reshaping the way penetration testers and defenders operate.
Join AI researchers Brian Fehrman and Derek Banks for a free one-hour training session that breaks down the OWASP Top 10 AI-LLM risks clearly and practically.
Join us for a free one-hour training session with incident management expert and instructor Gerard Johansen, where he'll teach how to adapt your Incident Response plan to AI-related risks and threats.
Join us for a free one-hour training session with James McQuiggan, CISSP and Advisory CISO, as he teaches you the full lifecycle of North Korea’s AI-enabled IT worker operation, from AI-generated identities and U.S.-based laptop farms to the data theft and extortion that follow once they’re inside.
Join Antisyphon instructor and security researcher Andrew Krug for a free one-hour Anti-cast on what really happens when AI collides with cloud security.
Join Patterson Cake, Black Hills Infosec Director of Incident Response, for a technical session outlining a prioritized approach to endpoint investigations, focusing on where and how unauthorized access and activity impact Windows and Linux.
Summit: March 25 @ 10:00 am – 4:00 pm EDT Live Training: March 26 – April 10 Security Operations Centers are where defenders grow, pressure is real, and impact matters. The Antisyphon Training SOC Summit is a free, 6-hour, live virtual event designed to give ...
In this 25-minute technical presentation, Seth Williams will walk through hands-on email forensics using Sublime Security’s free EML Analyzer, teaching you how to break down raw email files to uncover the true mechanics of phishing, malware delivery, and social engineering attacks.
