Instructor: Kent Ickler and Jordan Drysdale
Course Length: 16 Hours
Includes: Twelve months of complimentary access to the Antisyphon Cyber Range, certificate of participation, six months access to class recordings.
![Attack Detect Defend w/ Kent Ickler and Jordan Drysdale](https://www.antisyphontraining.com/wp-content/uploads/2024/03/Attack-Detect-Defend-ADD_Kent-Ickler-and-Jordan-Drysdale-1024x576.png)
![This Antisyphon Training Course is available as a Live Online presentation.](https://www.antisyphontraining.com/wp-content/uploads/2023/07/course-icon-live-training.png)
This page is for the Live version of this course. See below for any trainings currently scheduled. If there are no training sessions scheduled at this time, there may be an On-Demand version available.
If you are interested in arranging a private training for your organization, contact us to set up a call!
Course Description
This course will deep dive into what we call threat optics: auditing endpoints, centralizing logs, and visualizing results. Each student will leave the class having experienced a penetration test through three distinct perspectives, each building on the previous. This will be done by performing a series common adversarial attacks (the Red Team) followed by an examination of defensive postures, and wrapped up with various detection methodologies using open-source or free industry threat detection and defenses (the Blue Team).
Who Should Take This Course
- You want to improve the efficiencies of your red and blue teams.
- You have interest in threat optics.
- You want to implement a methodology for improving business processes around your security culture.
- Your business executives require ROI data to warrant further capital expenditure on threat-optic and threat-hunting initiatives.
- You have interest in modern pentest-related activities, including:
- Active Directory Certificate Services
- Command and Control
- Credential Attacks
- Kerberoasting
- Password Cracking
- Shadow Credentials
- And much more.
Student Requirements
- Exposure to Active Diretory.
- Access to an Azure Subscription for this lab environment.
Trainers
![Jordan Drysdale and Kent Ickler](https://www.antisyphontraining.com/wp-content/uploads/2021/08/kent_and_jordan_photo.jpg)
Jordan Drysdale
Jordan was around for the inception of Napster and the explosion of P2P networks. This drove his fascination with network systems and led him toward a career in IT. Jordan’s first gig in the industry included supporting Latin American networking customers for Hewlett Packard’s network support division. After five years of support, engineering, training, and stress, Jordan became a wireless escalations team lead and multi-vendor certified problem solver. With kids in tow, Jordan headed back toward the Dakotas to be nearer extended family and friends where he learned Citrix, VMware, VDI, supported Cisco gear, implemented profile management solutions, deployed remote networks at scale, and ensured performance across infrastructure. Before becoming a penetration tester, Jordan supported multiple (50+) domains as part of an MSSP’s rock star team. For the last five years, Jordan has been a penetration tester with the Black Hills InfoSec team.
Kent Ickler
Kent started his Information Technology career working for an Internet Service Provider supporting the MidWest’s broadband initiatives of the early 2000s. His interest in technology and business operations drove his career into working for multiple Fortune 500 companies and equipping their organizational leadership with business analytical data that would support their technology initiatives. With an understanding of Information Technology, System Administration, Accounting, and Business Law, Kent has helped businesses leverage technology for competitive advantage while balancing the risks associated with today’s dynamic network environments. Kent has been with Black Hills Information Security for three years in security and administration roles.
In addition to their Security Analyst roles at Black Hills Information Security, Jordan and Kent are Co-Founders of Defensive Origins…a cyber-security research, training, and consulting institution designed to assist Information Security professionals, Systems Administrators, and Organizational Leadership in developing, operating, and maintaining efficient secure network operations. Both Jordan and Kent have presented at multiple conferences, webcasts, and television programs, as well as written blogs discussing the importance of Network Security, Internet Privacy, and the importance of balancing Information Security business risk in today’s organizations.
If no live trainings appear below, please visit our Live Training Calendar for other classes that may interest you.