BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Antisyphon Training - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.antisyphontraining.com
X-WR-CALDESC:Events for Antisyphon Training
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250501T110000
DTEND;TZID=America/New_York:20250501T160000
DTSTAMP:20260414T111927
CREATED:20250404T191446Z
LAST-MODIFIED:20250421T202815Z
UID:10000767-1746097200-1746115200@www.antisyphontraining.com
SUMMARY:Workshop: Tactical Vulnerability Assessment with Matt Toussain
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/workshop-tactical-vulnerability-assessment-with-matt-toussain/
CATEGORIES:Pay What You Can,Workshop
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250502T110000
DTEND;TZID=America/New_York:20250502T160000
DTSTAMP:20260414T111927
CREATED:20250404T175801Z
LAST-MODIFIED:20250421T203157Z
UID:10000766-1746183600-1746201600@www.antisyphontraining.com
SUMMARY:Workshop: Hands on Kerberos with Tim Medin
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/workshop-hands-on-kerberos-with-tim-medin/
CATEGORIES:Pay What You Can,Workshop
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250507T090000
DTEND;TZID=America/New_York:20250509T170000
DTSTAMP:20260414T111927
CREATED:20241220T182717Z
LAST-MODIFIED:20250424T151403Z
UID:10000685-1746608400-1746810000@www.antisyphontraining.com
SUMMARY:Practical Physical Exploitation with Ralph May and Travis Weathers
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/practical-physical-exploitation-with-ralph-may-and-travis-weathers/
LOCATION:Tampa\, FL\, Tampa\, Florida\, United States
CATEGORIES:Pentesting,Physical Pentesting,Red Team
ORGANIZER;CN="Antisyphon Training":MAILTO:support@antisyphontraining.com
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250507T120000
DTEND;TZID=America/New_York:20250507T130000
DTSTAMP:20260414T111927
CREATED:20250411T182539Z
LAST-MODIFIED:20250507T223019Z
UID:10000768-1746619200-1746622800@www.antisyphontraining.com
SUMMARY:Anti-Cast: Threat Modeling: Embracing Worst-Case Scenarios with Dr. Dawn Beyer and Jacquelyn Blanchard
DESCRIPTION:What keeps you up at night? Do you constantly think of worst-case scenarios? If yes\, then you might be a natural threat modeler!! \n\n\n\nThreat modeling is a structured approach to identifying and mitigating potential threats and vulnerabilities in a system or application. Threats must be the primary driver of a well-designed and properly defended application\, system\, mission\, environment\, or enterprise.  \n\n\n\nJoin us for a one-hour free Antisyphon training session with Dr. Dawn Beyer and Jacquelyn Blanchard\, on Threat Modeling: Embracing Worst-Case Scenarios. \n\n\n\nThey’ll provide an overview of threat modeling and risk\, review of common methodologies and tools\, and provide practical examples of threat modeling.  \n\n\n\nThey’re excited to spend an hour nerding out on threat modeling with fellow “doom thinkers!” \n\n\n\n\nRegister Here\n\n\n\n\nJoin us for PreShow Banter™ at 11:30 AM ETChat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhis in the #🔴live-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nDon’t forget to check out our Course Catalog for our upcoming free and affordable cybersecurity training!
URL:https://www.antisyphontraining.com/event/anti-cast-threat-modeling-embracing-worst-case-scenarios-with-dr-dawn-beyer-and-jacquelyn-blanchard/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2025/04/Threat-Modeling-Embracing-Worst-Case-Scenarios-w-Dr.-Dawn-and-Jacquelyn-MAIN.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250512T110000
DTEND;TZID=America/New_York:20250515T160000
DTSTAMP:20260414T111927
CREATED:20241205T195049Z
LAST-MODIFIED:20250509T165348Z
UID:10000677-1747047600-1747324800@www.antisyphontraining.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK with John Strand
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/getting-started-in-security-with-bhis-and-mitre-attck-with-john-strand-3/
CATEGORIES:Blue Team,Fundamentals,Mitre Att&ck,Pay What You Can
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250514T120000
DTEND;TZID=America/New_York:20250514T130000
DTSTAMP:20260414T111927
CREATED:20250411T182556Z
LAST-MODIFIED:20250507T223026Z
UID:10000769-1747224000-1747227600@www.antisyphontraining.com
SUMMARY:Anti-Cast: Rapid Endpoint Investigations with Patterson Cake
DESCRIPTION:You’ve had a “true positive” security event on a Windows or Linux endpoint (or more than one)! \n\n\n\nNow what!?!? \n\n\n\nJoin Patterson Cake for a one-hour\, no-cost Antisyphon Anti-cast on “tactical forensics” in response to Windows and Linux endpoint security events and learn how to: \n\n\n\n\nLeverage free tools and scripts for streamlined investigations\n\n\n\nIdentify the right artifacts to examine quickly\n\n\n\nGather critical evidence efficiently\n\n\n\nDetermine what happened\, spot indicators of compromise (IoCs)\, and assess impact fast\n\n\n\nPlan next steps with clarity and confidence\n\n\n\n\nPerfect for anyone looking to sharpen their incident response skills. \n\n\n\n \n\n\n\n\nRegister Here\n\n\n\n\nJoin us for PreShow Banter™ at 11:30 AM ETChat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhis in the #🔴live-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nDon’t forget to check out our Course Catalog for our upcoming free and affordable cybersecurity training!
URL:https://www.antisyphontraining.com/event/anti-cast-rapid-endpoint-investigations-with-patterson-cake/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2025/04/Rapid-Endpoint-Investigations-w-Patterson-Cake-MAIN.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250521T120000
DTEND;TZID=America/New_York:20250521T130000
DTSTAMP:20260414T111927
CREATED:20250414T171348Z
LAST-MODIFIED:20250507T223044Z
UID:10000770-1747828800-1747832400@www.antisyphontraining.com
SUMMARY:Anti-Cast: The Human Factor in AI Driven Cybersecurity with Fletus Poston III
DESCRIPTION:Artificial Intelligence (AI) is transforming cybersecurity\, but the human element remains key. \n\n\n\nJoin us for a free one-hour training session by Fletus Poston\, as he highlights the indispensable role of humans in AI-driven cybersecurity\, focusing on three key areas: \n\n\n\n\nThe Human Touch\n\nWe’ll discuss how human expertise remains vital in balancing the nuances of complex security threats with the precision of AI-driven decision-making.\n\n\n\n\n\nEthical AI in Cybersecurity\n\nThe importance of integrating ethics into AI development will be highlighted\, emphasizing the need to prioritize fairness\, transparency\, and accountability in AI-driven cybersecurity decisions.\n\n\n\n\n\nContinuous Learning is Imperative\n\nWe’ll emphasize that continuous learning is essential for professionals to stay current with evolving threats and technologies\, ensuring they can effectively collaborate with AI systems.\n\n\n\n\n\n\nThis Antisyphon Anticast will cover how AI enhances\, not replaces\, human skills and the urgency of preparing a future-ready cybersecurity workforce. \n\n\n\nKey Takeaways: \n\n\n\n\nAI automation should be viewed as an enhancement of human capabilities\, rather than a replacement.\n\n\n\nHuman expertise remains vital in balancing AI-driven decision-making.\n\n\n\nEthical considerations must be integrated into AI development in cybersecurity.\n\n\n\nContinuous learning is essential for professionals to stay current with evolving threats and technologies.\n\n\n\n\n \n\n\n\n\nRegister Here\n\n\n\n\nJoin us for PreShow Banter™ at 11:30 AM ETChat with your fellow attendees in the BHIS Discord server:https://discord.gg/bhis in the #🔴live-chat channel \n\n\n\nStay up to date on our upcoming live Anti-Casts and more at https://poweredbybhis.com \n\n\n\nDon’t forget to check out our Course Catalog for our upcoming free and affordable cybersecurity training!
URL:https://www.antisyphontraining.com/event/anti-cast-the-human-factor-in-ai-driven-cybersecurity-with-fletus-poston-iii/
CATEGORIES:Anti-Cast
ATTACH;FMTTYPE=image/webp:https://www.antisyphontraining.com/wp-content/uploads/2025/04/The-Human-Factor-in-AI-Driven-Cybersecurity-w-Fletus-Poston-III-MAIN.webp
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250530T110000
DTEND;TZID=America/New_York:20250530T160000
DTSTAMP:20260414T111927
CREATED:20250415T172947Z
LAST-MODIFIED:20250421T204756Z
UID:10000773-1748602800-1748620800@www.antisyphontraining.com
SUMMARY:Workshop: Offensive Tooling Foundations with Chris Traynor
DESCRIPTION:
URL:https://www.antisyphontraining.com/event/workshop-offensive-tooling-foundations-with-chris-traynor/
CATEGORIES:Pay What You Can,Workshop
END:VEVENT
END:VCALENDAR