Skip to content
Antisyphon Training

Antisyphon Training

  • Home
  • News & Updates
  • Live Training
    • Live Training Calendar
    • Live Training Course Catalog
    • Pay What You Can Training
    • Training Roadmap
    • Cybersecurity Training for Businesses
    • The Vault Program
  • On-Demand Training
    • On-Demand Course Catalog
    • Training Roadmap
    • Cybersecurity Training for Businesses
    • MSP Training
    • The Vault Program
  • Cyber Range
    • About Our Cyber Range
    • ACE-Tâ„¢ Certification
    • Purchase Subscription
  • About
    • Mission
    • FAQ
    • Giving Back
    • Our Instructors
    • Testimonials
  • Contact Us
  • Toggle search form

News & Updates

Here at Antisyphon, we have lots of things going on! New trainings, Anti-Casts (our own special blend of webcast 😉 ), conferences we’re attending, and so much more! We know it’s tough to keep track of everything we are doing, so here are the latest updates…

News Update

  • Blue Team Summit Coming in August 2023!

    June 5, 2023
    Blue Team Cyber Defenders

    Blue Teamers have it rough, so we’re putting together an online summit event just for them featuring talks, trainings, and lots of fun and frivolity! The Antisyphon Blue Team Summit 2023 is scheduled for August 24-25, 2023.

  • Antisyphon Cyber Range: Remembering Fallen Heroes

    May 24, 2023
    A young girl standing in a military cemetery. There are American flags placed next to each grave marker. The grave markers are made from white marble, and the field is grassy with many white-colored wildflowers.

    Hey everybody! Here in the U.S., Memorial Day Weekend is the unofficial beginning of summer. The weather is warmer, summer vacation is just around the corner, and while some folks…

    Read more… “Antisyphon Cyber Range: Remembering Fallen Heroes” »

  • Registration Closing: Introduction to Industrial Control Systems

    May 22, 2023
    Introduction to Industrial Control Systems

    Last chance to register for Industrial Control Systems Course! This is your final opportunity to register for “Introduction to Industrial Control Systems” with Ashley Van Hoesen! Registration Deadline: Tonight, May 22,…

    Read more… “Registration Closing: Introduction to Industrial Control Systems” »

  • Professionally Evil Application Security is back for another run!

    May 19, 2023
    Application Security

    Join us for the upcoming run of the “Professionally Evil Application Security (PEAS)” course with Kevin Johnson! Course Duration: 5 days (July 31 – August 4)Price: $720 (Includes 12 months access…

    Read more… “Professionally Evil Application Security is back for another run!” »

  • Sharpen your skills with Security Leadership and Management!

    May 18, 2023

    Are you ready to take your security leadership and management skills to new heights? We’re excited to announce an upcoming run of “Security Leadership and Management” with Chris Brenton with Gain the…

    Read more… “Sharpen your skills with Security Leadership and Management!” »

  • Sharpen your skills with Professionally Evil Container Security!

    May 16, 2023

    Exciting Announcement! Join us for the upcoming run of “Professionally Evil Container Security (PECSEC)” with cybersecurity expert Cory Sabol. Mark your calendars for July 11-12, as we dive deep into the…

    Read more… “Sharpen your skills with Professionally Evil Container Security!” »

  • What are Backdoors & Breaches: Campaigns?

    May 16, 2023

    Do you want to play Backdoors & Breaches, but need a bit of help getting a game started? You understand the rules, but quickly coming up with an incident to…

    Read more… “What are Backdoors & Breaches: Campaigns?” »

  • Antisyphon Cyber Range: Merry May Madness!

    May 10, 2023
    Part 1 of OAuth problem series These days you'll find "Login with Google," "Login with Facebook," or "Login with $provider" buttons on plenty of sites. In order to power this feature, client sites communicate with authorization/resource servers (ie Google, Facebook, etc) according to RFC 6749 which defines the OAuth 2.0 Standard. We've created two sites for you to poke at, a Client Site and our own Authorization & Resource Server. As it turns out, OAuth is somewhat hard to do right. Many major sites have messed this up... For this problem, all you need to do is send the admin a link to click via the Contact form on the Client Site. Your goal will be to steal the admin's authorization code (basically you trick them into clicking a link and when they click through the "Authorize" button, you get the code instead of the Client Site). For now, just steal the code. In a later problem, you'll have to utilize this stolen code to essentially take over the admin's account :)

    Hey everybody! Isn’t May a merry month? And for our first release of challenges for May, we have four webapp challenges that range in difficulty from fairly basic to OMG!…

    Read more… “Antisyphon Cyber Range: Merry May Madness!” »

  • Enterprise Forensics & Response Slides

    May 8, 2023

    Attention All Cybersecurity Enthusiasts! We have great news for you! The slide deck for Gerard Johansen’s webcast on “Enterprise Forensics and Response” is now available for viewing and download. The…

    Read more… “Enterprise Forensics & Response Slides” »

1 2 3 4
Next Page

Join the Antisyphon Training Discord Server!
  • Twitter
  • LinkedIn
  • Mastodon
PROMPT#

Copyright © 2023 Antisyphon

Powered by PressBook Dark WordPress theme