Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

Social Posts

Pages

Antisyphon Training Presents Trainings by: Default Image

Antisyphon Training Presents Trainings by:

The Secure Ideas instructors have over two decades of experience in the technology and education industries, ranging from Penetration Testing and Software Development to Open Source Coding and AD Infrastructure. Whether you’re looking for a new certification and are in need of CPEs or just looking for ways to improve…

About Antisyphon Training Default Image

About Antisyphon Training

…Training Antisyphon Training emerged as a response to the growing demand for approachable, accessible, and affordable education. The courses are designed to bridge the gap between theoretical understanding and practical application in the field of cybersecurity. Our industry-leading instructors come from: BHIS Secure Ideas Red Siege US Military Our Course…

Blog Posts

Your Active DAD (Active Domain Active Defense) Primer

…maintenance moving forward. So why we’re doing this is trying to prime the pump right, get ideas flowing. One of the things that we think is really, really cool about trying to get these ideas moving in organizations is once we talk about these in webcasts, once we talk about…

Anti-Cast | API-ocalypse Now w/ Jennifer Shannon

Join us for this week’s Anti-Cast with Jennifer Shannon!

This week’s Anti-Cast is with… Jennifer Shannon!! Join us Wednesday, Sept. 20 at 12 p.m. EDT, for “API-ocalypse Now.” → Register here. As always, join us early, 11:30 a.m. EDT, for a little PreShow Banter™! Get ready for a wild ride as Jennifer Shannon, a Senior Security Consultant at Secure

How to Use Python to Spy on Your Friends Web APIs, Recon ng, & OSINT

How to Use Python to Spy on Your Friends: Web APIs, Recon ng, & OSINT

secure ideas. We have Kevin Johnson coming. Larry is coming, Paul is coming. M Chris Gates. BB King I can’t even. Sierra I can’t even name them anymore. There’s so many. So. But they’re all on the website. John Strand They are all on our website. Sierra So we’re pretty…

How to Build a Home Lab

How to Build a Home Lab (with Bill Stearns)

…ask, where do we come up for ideas of webcasts? And a lot of the ideas for webcasts actually pop up out of these existing webcasts that we’re in. So please keep contributing. Keep contributing. so, Bill, do you want to walk us through why anyone would ever want to…

Return on Influence (ROI): Social Engineering for Good

…in our DevOps cycle, we have a dev sec ops cycle where they’re integrated. What about our repositories and the whole CI CD pipeline? Not just is our software going out secure, but is our, infrastructure for managing that, is that secure? Because that might be separate from the infrastructure…

The SOC Age Or, A Young SOC Analyst’s Illustrated Primer

A Young SOC Analyst’s Illustrated Primer

…say that they were horrible. That’s not true. They’re very, very excited people. They’re involved and they want to really do well. But I’ve noticed that a lot of them are missing some absolute core key skills whenever it comes to trying to secure, trying to secure the systems, or…

Shopping Cart

No products in the cart.