Skip to content
Antisyphon Training

Antisyphon Training

  • Home
  • News & Updates
  • Calendar
  • Training
    • Course Catalog
    • Live Training
      • Live Courses Catalog
      • Live Training Calendar
    • On-Demand Training
      • On-Demand Catalog
      • Security for MSPs
    • Pay What You Can Training
    • Cybersecurity Training for Businesses
    • The Vault Program
    • Training Roadmap
  • Summits
    • Upcoming Summits
    • Past Summits
  • Cyber Range
    • About Our Cyber Range
    • ACE-T™ Certification
    • Purchase Subscription
  • About
    • Mission
    • FAQ
    • Our Instructors
    • Giving Back
    • Testimonials
  • Contact Us
  • Toggle search form
Loading view.

Live

  1. Events
  2. Live

Events Search and Views Navigation

Event Views Navigation

  • List
  • Month
  • Day
  • Summary
Today

Filters

Changing any of the form inputs will cause the list of events to refresh with the filtered results.

Event Category
Cost ($)
Tags
Venues
Day
Time

October 2023

Tue 3
Secure Ideas - Introduction to PCI (PCI 101)
October 3 @ 12:00 pm - 4:00 pm EDT Event Series Introduction to PCI (PCI 101)

Introduction to PCI (PCI 101)

Online

This course is designed to introduce IT professionals to the Payment Card Industry collection of standards as defined and enforced by the Payment Card Industry Security Standards Council. The first half of the course summarizes the structure and history of PCI, the primary standards documents, and the various certification programs for professionals. The second half of the course dives into a summary of the components of the PCI Data Security Standard (PCI DSS). This is a high-level, introductory summary designed to provide a general understanding of the requirements in the PCI DSS.

Free – $150
Tue 3
Secure Ideas - Professionally Evil CISSP Mentorship
October 3 @ 2:00 pm - 4:00 pm EDT Event Series Professionally Evil CISSP Mentorship Program

Professionally Evil CISSP Mentorship Program

Online

ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.

$100 – $1000
Wed 4
October 4 @ 12:00 pm - 4:00 pm EDT Event Series Professionally Evil Application Security (PEAS)

Professionally Evil Application Security (PEAS): Unveiling Server-Side Discovery and Exploitation

Online

Welcome to the world of application security, where you'll unravel the hidden flaws lurking within server-side portions of web applications. Join us for the second course in the Professionally Evil Application Security series.

$25 – $150
Tue 10
Secure Ideas - Professionally Evil CISSP Mentorship
October 10 @ 2:00 pm - 4:00 pm EDT Event Series Professionally Evil CISSP Mentorship Program

Professionally Evil CISSP Mentorship Program

Online

ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.

$100 – $1000
Tue 17
Secure Ideas - Professionally Evil CISSP Mentorship
October 17 @ 2:00 pm - 4:00 pm EDT Event Series Professionally Evil CISSP Mentorship Program

Professionally Evil CISSP Mentorship Program

Online

ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.

$100 – $1000
Tue 24
Secure Ideas - Professionally Evil CISSP Mentorship
October 24 @ 2:00 pm - 4:00 pm EDT Event Series Professionally Evil CISSP Mentorship Program

Professionally Evil CISSP Mentorship Program

Online

ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.

$100 – $1000
Tue 31
Getting Started with Packet Decoding with Chris Brenton
October 31 @ 11:00 am - 4:00 pm EDT Event Series Getting Started in Packet Decoding

Getting Started in Packet Decoding

Online

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.

Free – $575
Tue 31
Professionally Evil API Testing_AAA and Keys are Not Just for Cars
October 31 @ 12:00 pm - 4:00 pm EDT Event Series Professionally Evil API Testing

Professionally Evil API Testing: AAA and Keys are Not Just for Cars

Online

This course will teach you how to test web APIs for authorization and access control related security flaws. You will learn how to map API functionality, identify authentication and authorization flaws, and exploit common API vulnerabilities. You will also gain hands-on  experience with tools and techniques for testing API authorization mechanisms and access control models.

$25 – $150
Tue 31
Secure Ideas - Professionally Evil CISSP Mentorship
October 31 @ 2:00 pm - 4:00 pm EDT Event Series Professionally Evil CISSP Mentorship Program

Professionally Evil CISSP Mentorship Program

Online

ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.

$100 – $1000

November 2023

Wed 1
Getting Started with Packet Decoding with Chris Brenton
November 1 @ 12:00 pm - 4:00 pm EDT Event Series Getting Started in Packet Decoding

Getting Started in Packet Decoding

Online

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.

Free – $575
Wed 1
Professionally Evil Container Security (PECSEC) - Kubernetes Under Siege: Mastering Penetration Testing Techniques w/ Cory Sabol
November 1 @ 12:00 pm - 4:00 pm EDT Event Series Professionally Evil Container Security (PECSEC)

Professionally Evil Container Security (PECSEC) – Kubernetes Under Siege: Mastering Penetration Testing Techniques

Online

In this comprehensive training course, participants will gain a deep understanding of the vulnerabilities that could potentially exist within Kubernetes clusters. Learn to think like an attacker, discover ways to exploit security gaps, and understand how to penetrate various defense mechanisms. The course will introduce practical scenarios and hands-on exercises that simulate real-world attacks on Kubernetes, enabling participants to apply their learning immediately. Whether you are a DevOps engineer, a security professional, or just passionate about cybersecurity, this course will empower you with knowledge and skills needed to perform penetration testing in a Kubernetes environment.

$25 – $150
Thu 2
Getting Started with Packet Decoding with Chris Brenton
November 2 @ 12:00 pm - 4:00 pm EDT Event Series Getting Started in Packet Decoding

Getting Started in Packet Decoding

Online

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.

Free – $575
Fri 3
Getting Started with Packet Decoding with Chris Brenton
November 3 @ 12:00 pm - 4:00 pm EDT Event Series Getting Started in Packet Decoding

Getting Started in Packet Decoding

Online

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.

Free – $575
Tue 7
Secure Ideas - Professionally Evil CISSP Mentorship
November 7 @ 2:00 pm - 4:00 pm EST Event Series Professionally Evil CISSP Mentorship Program

Professionally Evil CISSP Mentorship Program

Online

ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.

$100 – $1000
Wed 8
Professionally Evil Application Security (PEAS): Mastering Client-Side Flaws and Exploitation
November 8 @ 12:00 pm - 4:00 pm EST Event Series Professionally Evil Application Security (PEAS)

Professionally Evil Application Security (PEAS): Mastering Client-Side Flaws and Exploitation

Online

Embark on the finale of our Professionally Evil Application Security series with our course, Mastering Client-Side Flaws and Exploitation. In this session, you'll uncover the secrets of client-side vulnerabilities and learn how to secure web applications against potential threats. 

$25 – $150
Tue 14
Introduction to Industrial Control Systems with Ashley Van Hoesen
November 14 @ 11:00 am - 4:00 pm EST Event Series Introduction to Industrial Control Systems

Introduction to Industrial Control Systems

Online

Instructor: Ashley Van HoesenCourse Length: 4 Days, 16 Hours Course Description This comprehensive course is designed to deeply understand cybersecurity's key concepts, components, and role in modern industries. Whether you have minimal knowledge or experience in ICS, this course will equip you with the necessary skills to excel in this field. Through theoretical instruction and...

Read more... “Introduction to Industrial Control Systems” »

$575
Tue 14
Secure Ideas - Professionally Evil CISSP Mentorship
November 14 @ 2:00 pm - 4:00 pm EST Event Series Professionally Evil CISSP Mentorship Program

Professionally Evil CISSP Mentorship Program

Online

ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.

$100 – $1000
Wed 15
Introduction to Industrial Control Systems with Ashley Van Hoesen
November 15 @ 12:00 pm - 4:00 pm EST Event Series Introduction to Industrial Control Systems

Introduction to Industrial Control Systems

Online

Instructor: Ashley Van HoesenCourse Length: 4 Days, 16 Hours Course Description This comprehensive course is designed to deeply understand cybersecurity's key concepts, components, and role in modern industries. Whether you have minimal knowledge or experience in ICS, this course will equip you with the necessary skills to excel in this field. Through theoretical instruction and...

Read more... “Introduction to Industrial Control Systems” »

$575
Thu 16
Practical Physical Exploitation | Ralph May & Travis Weathers
November 16 @ 9:00 am - 5:00 pm EST Event Series Practical Physical Exploitation

Practical Physical Exploitation

Tampa, FL Tampa, Florida, United States

Instructor: Ralph May & Travis WeathersCourse Length: 3 Days, 24 Hours (please note, this is an in-person only class) Includes: Twelve months of complimentary access to the Antisyphon Cyber Range, certificate of participation. Pricing: Location: Course Description Are you a seasoned penetration tester looking to learn how to perform physical security assessments or new to the industry...

Read more... “Practical Physical Exploitation” »

$2750
Thu 16
Introduction to Industrial Control Systems with Ashley Van Hoesen
November 16 @ 12:00 pm - 4:00 pm EST Event Series Introduction to Industrial Control Systems

Introduction to Industrial Control Systems

Online

Instructor: Ashley Van HoesenCourse Length: 4 Days, 16 Hours Course Description This comprehensive course is designed to deeply understand cybersecurity's key concepts, components, and role in modern industries. Whether you have minimal knowledge or experience in ICS, this course will equip you with the necessary skills to excel in this field. Through theoretical instruction and...

Read more... “Introduction to Industrial Control Systems” »

$575
Fri 17
Practical Physical Exploitation | Ralph May & Travis Weathers
November 17 @ 9:00 am - 5:00 pm EST Event Series Practical Physical Exploitation

Practical Physical Exploitation

Tampa, FL Tampa, Florida, United States

Instructor: Ralph May & Travis WeathersCourse Length: 3 Days, 24 Hours (please note, this is an in-person only class) Includes: Twelve months of complimentary access to the Antisyphon Cyber Range, certificate of participation. Pricing: Location: Course Description Are you a seasoned penetration tester looking to learn how to perform physical security assessments or new to the industry...

Read more... “Practical Physical Exploitation” »

$2750
Fri 17
Introduction to Industrial Control Systems with Ashley Van Hoesen
November 17 @ 12:00 pm - 4:00 pm EST Event Series Introduction to Industrial Control Systems

Introduction to Industrial Control Systems

Online

Instructor: Ashley Van HoesenCourse Length: 4 Days, 16 Hours Course Description This comprehensive course is designed to deeply understand cybersecurity's key concepts, components, and role in modern industries. Whether you have minimal knowledge or experience in ICS, this course will equip you with the necessary skills to excel in this field. Through theoretical instruction and...

Read more... “Introduction to Industrial Control Systems” »

$575
Sat 18
Practical Physical Exploitation | Ralph May & Travis Weathers
November 18 @ 9:00 am - 5:00 pm EST Event Series Practical Physical Exploitation

Practical Physical Exploitation

Tampa, FL Tampa, Florida, United States

Instructor: Ralph May & Travis WeathersCourse Length: 3 Days, 24 Hours (please note, this is an in-person only class) Includes: Twelve months of complimentary access to the Antisyphon Cyber Range, certificate of participation. Pricing: Location: Course Description Are you a seasoned penetration tester looking to learn how to perform physical security assessments or new to the industry...

Read more... “Practical Physical Exploitation” »

$2750
Tue 28
Professionally Evil API Testing: GraphQL, SOAP, and REST Fundamentals and Techniques
November 28 @ 12:00 pm - 4:00 pm EST Event Series Professionally Evil API Testing

Professionally Evil API Testing: GraphQL, SOAP, and REST Fundamentals and Techniques

Online

Are you interested in learning how to test different types of APIs for quality and security? Do you want to dive into the essential skills and techniques for testing GraphQL, SOAP, and REST APIs? If so, this course is for you! In this course, you will learn the fundamentals of API testing, including what APIs are, how they work, and why they are important. You will also learn the differences between GraphQL, SOAP, and REST APIs, and how they affect the way you test them for flaws and vulnerabilities. You will gain hands-on experience with various tools and frameworks for API testing, such as Postman, SoapUI, and GraphQL Playground.

$25 – $150
Wed 29
Professionally Evil Container Security (PECSEC) - Fortress Kubernete: A Comprehensive Guide to Defending and Hardening Kubernetes Systems
November 29 @ 12:00 pm - 4:00 pm EST Event Series Professionally Evil Container Security (PECSEC)

Professionally Evil Container Security (PECSEC) – Fortress Kubernetes: A Comprehensive Guide to Defending and Hardening Kubernetes Systems

Online

This training course aims to equip participants with the skills necessary to defend and harden Kubernetes systems effectively. The curriculum will cover best practices for Kubernetes security, from deploying secure configurations to hardening runtime environments. Learners will explore how to improve the security of their Kubernetes clusters, employ proactive defense mechanisms, and implement robust hardening measures to prevent unauthorized access. Through hands-on exercises, participants will gain practical knowledge to secure their Kubernetes deployments. This course is recommended for anyone involved in managing or securing Kubernetes infrastructures, as well as those interested in mastering Kubernetes security. 

$25 – $150

December 2023

Wed 6
Come to the Antisyphon Snake Oil? Summit. Guaranteed to make you the Best Hacker Around! December 6, 2023 11AM-4PM EST. Training December 7&8.
Featured Featured December 6 @ 11:00 am - December 8 @ 6:00 pm EST Event Series Snake Oil? Summit 2023

Antisyphon Snake Oil? Summit 2023

Online

Join us for the Antisyphon Snake Oil Summit, where we will embark on a journey through the intricate landscape of cybersecurity, demystifying over-hyped products and solutions that flood the market.

Free
Thu 7
Intro to Offensive Tooling w/ Chris Traynor
December 7 @ 9:00 am - 2:00 pm EST Event Series Snake Oil? Summit 2023

Intro to Offensive Tooling

Online

This hands-on course covers a variety of offensive tools, such as Nmap, Recon-ng, Metasploit, Proxychains, Responder, and many more. Through a series of practical labs, you will gain experience in using these tools to assess the security of systems and networks. In addition to learning how to use these tools effectively, you will also explore the ethical considerations surrounding offensive tooling, how to responsibly use these tools to protect sensitive information, and prevent cyber attacks.

$295
Thu 7
Advanced Endpoint Investigations
December 7 @ 9:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Advanced Endpoint Investigations

Online

For most security teams, high operational tempo (measured in dumpster fire lumens) incentivizes analysts to stick to well-tailored playbooks that prioritize remediation at the expense of proper incident scoping and root cause analysis. Though modern endpoint security products have significantly improved host visibility, most critical incidents will require the acquisition and analysis of additional endpoint data.

$575
Thu 7
Advanced Network Threat Hunting with Chris Brenton
December 7 @ 9:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Advanced Network Threat Hunting

Online

So far we’ve had over 21,000 students attend our one-day network threat hunting course. Many have asked that we provide an extended class with more hands-on lab time. That is exactly what we have rolled into this 16-hour course!

$575
Thu 7
Breaching the Cloud with Beau Bullock
December 7 @ 9:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Breaching the Cloud

Online

This training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization.

$575
Thu 7
Hacking Active Directory Fundamentals and Techniques w/ Dale Hobbs
December 7 @ 9:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Hacking Active Directory: Fundamentals and Techniques

Online

The majority of enterprise networks today are managed using Microsoft Active Directory and it is crucial for a security professional to understand the current threats to a modern Windows environment.

The course begins with an overview of Active Directory architecture and how it can be leveraged by attackers to gain access to critical assets. Participants will learn about the various attack vectors and methods used to compromise Active Directory, such as password attacks, service abuse and privilege escalation.

$575
Thu 7
Incident Response Foundations with Derek Banks
December 7 @ 9:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Incident Response Foundations

Online

The goal of this course is to provide the core components that make up a successful Incident Response program. Students will learn how to get started on their IR journey, what to prioritize, and why boring stuff like policies and procedures are just as important as technical digital forensics skills.

$575
Thu 7
Introduction to Pentesting with John Strand
December 7 @ 9:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Introduction to Pentesting

Online

In this training course, we will examine the different types of penetration testing engagements and take a deep dive into establishing a repeatable testing methodology for executing quality tests. We will look at some tools of the trade to understand what they are doing under the hood, identify what separates a great finding from a good finding in reports, and really zero in on establishing your own methodology!

$575
Thu 7
Introduction to Python
December 7 @ 9:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Introduction to Python

Online

This course aims to teach the fundamentals of the Python programming language such that a student will gain a beginning to intermediate level of competency with the language. Labs will be presented in a Capture the Flag (CTF) style format as well as some more comprehensive programming tasks.

$575
Thu 7
Network Forensics and Incident Response with Troy Wojewoda
December 7 @ 9:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Network Forensics and Incident Response

Online

Incident responders are continually faced with the challenge of collecting and analyzing relevant event data—network communications is no exception. This course uses an assortment of network data acquisition tools and techniques with a focus on open-source, vendor-neutral solutions. Students who take this course will learn how to perform network traffic and protocol analysis that ultimately supports cybersecurity incident response efforts. From reconnaissance to data exfiltration, network traffic scales to provide a bird’s-eye view of attacker activity. Leveraging the vantage point of key network traffic chokepoints, this course explores nearly every phase of an attacker’s methodology. Students will learn network traffic analysis concepts and work through hands-on lab exercises that reinforce the course material using real-world attack scenarios.

$575
Thu 7
Next Level OSINT with Mishaal Khan
December 7 @ 9:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Next Level OSINT

Online

The course progresses from basic to very advanced practical OSINT techniques that you can use in your investigative routine. No special software, operating system, or paid licenses are required. Bookmarks for all tools and websites used will be provided for quick access. 

$575
Thu 7
Ransomware Attack Simulation and Investigation for Blue Teamers w/ Markus Schober
December 7 @ 9:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Ransomware Attack Simulation and Investigation for Blue Teamers

Online

As a cyber security defender and investigator, we often just get to analyze an environment that suffered a ransomware attack after the ransomware execution, where we are trying to make our way back in time to understand the scope and initial infection vectors of a breach. However, knowing how attackers operate and having an understanding of their tools can help tremendously to conduct a more effective analysis and response and ultimately lower the impact of such attacks. This is why in this workshop we will teach you how to perform the common steps of every phase in a ransomware attack scenario as the attacker, from initial infection to impact.

$575
Thu 7
Security Defense and Detection TTX with Amanda Berlin and Jeremy Mio
December 7 @ 9:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Security Defense and Detection TTX

Online

Security Defense and Detection TTX is a comprehensive four-day tabletop exercise that involves the introduction to completion of security TTXs (tabletop exercises), IR playbooks, and after-action reports. The exercises are paired with video and lab demonstrations that reinforce their purpose. The training as a whole is compatible with the world’s most popular RPG rules.

$575
Thu 7
x86_32 Assembly and Shellcode-Lab for Linux w/ Marco Lux
December 7 @ 9:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

x86_32 Assembly and Shellcode-Lab for Linux

Online

Explore the world of Shellcoding designed for x86 architecture! This detailed course will introduce you to the basic principles of crafting low-level codes. Learn about the assembly language, gain fundamental insights into the process of writing shellcode. We will focus mostly on shellcoding, but also touch aspects of exploitation to offer a well-rounded understanding.

$575
Fri 8
Intro to Offensive Tooling w/ Chris Traynor
December 8 @ 10:00 am - 2:00 pm EST Event Series Snake Oil? Summit 2023

Intro to Offensive Tooling

Online

This hands-on course covers a variety of offensive tools, such as Nmap, Recon-ng, Metasploit, Proxychains, Responder, and many more. Through a series of practical labs, you will gain experience in using these tools to assess the security of systems and networks. In addition to learning how to use these tools effectively, you will also explore the ethical considerations surrounding offensive tooling, how to responsibly use these tools to protect sensitive information, and prevent cyber attacks.

$295
Fri 8
Advanced Endpoint Investigations
December 8 @ 10:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Advanced Endpoint Investigations

Online

For most security teams, high operational tempo (measured in dumpster fire lumens) incentivizes analysts to stick to well-tailored playbooks that prioritize remediation at the expense of proper incident scoping and root cause analysis. Though modern endpoint security products have significantly improved host visibility, most critical incidents will require the acquisition and analysis of additional endpoint data.

$575
Fri 8
Advanced Network Threat Hunting with Chris Brenton
December 8 @ 10:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Advanced Network Threat Hunting

Online

So far we’ve had over 21,000 students attend our one-day network threat hunting course. Many have asked that we provide an extended class with more hands-on lab time. That is exactly what we have rolled into this 16-hour course!

$575
Fri 8
Hacking Active Directory Fundamentals and Techniques w/ Dale Hobbs
December 8 @ 10:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Hacking Active Directory: Fundamentals and Techniques

Online

The majority of enterprise networks today are managed using Microsoft Active Directory and it is crucial for a security professional to understand the current threats to a modern Windows environment.

The course begins with an overview of Active Directory architecture and how it can be leveraged by attackers to gain access to critical assets. Participants will learn about the various attack vectors and methods used to compromise Active Directory, such as password attacks, service abuse and privilege escalation.

$575
Fri 8
Breaching the Cloud with Beau Bullock
December 8 @ 10:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Breaching the Cloud

Online

This training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization.

$575
Fri 8
Incident Response Foundations with Derek Banks
December 8 @ 10:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Incident Response Foundations

Online

The goal of this course is to provide the core components that make up a successful Incident Response program. Students will learn how to get started on their IR journey, what to prioritize, and why boring stuff like policies and procedures are just as important as technical digital forensics skills.

$575
Fri 8
Introduction to Pentesting with John Strand
December 8 @ 10:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Introduction to Pentesting

Online

In this training course, we will examine the different types of penetration testing engagements and take a deep dive into establishing a repeatable testing methodology for executing quality tests. We will look at some tools of the trade to understand what they are doing under the hood, identify what separates a great finding from a good finding in reports, and really zero in on establishing your own methodology!

$575
Fri 8
Introduction to Python
December 8 @ 10:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Introduction to Python

Online

This course aims to teach the fundamentals of the Python programming language such that a student will gain a beginning to intermediate level of competency with the language. Labs will be presented in a Capture the Flag (CTF) style format as well as some more comprehensive programming tasks.

$575
Fri 8
Network Forensics and Incident Response with Troy Wojewoda
December 8 @ 10:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Network Forensics and Incident Response

Online

Incident responders are continually faced with the challenge of collecting and analyzing relevant event data—network communications is no exception. This course uses an assortment of network data acquisition tools and techniques with a focus on open-source, vendor-neutral solutions. Students who take this course will learn how to perform network traffic and protocol analysis that ultimately supports cybersecurity incident response efforts. From reconnaissance to data exfiltration, network traffic scales to provide a bird’s-eye view of attacker activity. Leveraging the vantage point of key network traffic chokepoints, this course explores nearly every phase of an attacker’s methodology. Students will learn network traffic analysis concepts and work through hands-on lab exercises that reinforce the course material using real-world attack scenarios.

$575
Fri 8
Next Level OSINT with Mishaal Khan
December 8 @ 10:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Next Level OSINT

Online

The course progresses from basic to very advanced practical OSINT techniques that you can use in your investigative routine. No special software, operating system, or paid licenses are required. Bookmarks for all tools and websites used will be provided for quick access. 

$575
Fri 8
Ransomware Attack Simulation and Investigation for Blue Teamers w/ Markus Schober
December 8 @ 10:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Ransomware Attack Simulation and Investigation for Blue Teamers

Online

As a cyber security defender and investigator, we often just get to analyze an environment that suffered a ransomware attack after the ransomware execution, where we are trying to make our way back in time to understand the scope and initial infection vectors of a breach. However, knowing how attackers operate and having an understanding of their tools can help tremendously to conduct a more effective analysis and response and ultimately lower the impact of such attacks. This is why in this workshop we will teach you how to perform the common steps of every phase in a ransomware attack scenario as the attacker, from initial infection to impact.

$575
Fri 8
Security Defense and Detection TTX with Amanda Berlin and Jeremy Mio
December 8 @ 10:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

Security Defense and Detection TTX

Online

Security Defense and Detection TTX is a comprehensive four-day tabletop exercise that involves the introduction to completion of security TTXs (tabletop exercises), IR playbooks, and after-action reports. The exercises are paired with video and lab demonstrations that reinforce their purpose. The training as a whole is compatible with the world’s most popular RPG rules.

$575
Fri 8
x86_32 Assembly and Shellcode-Lab for Linux w/ Marco Lux
December 8 @ 10:00 am - 6:00 pm EST Event Series Snake Oil? Summit 2023

x86_32 Assembly and Shellcode-Lab for Linux

Online

Explore the world of Shellcoding designed for x86 architecture! This detailed course will introduce you to the basic principles of crafting low-level codes. Learn about the assembly language, gain fundamental insights into the process of writing shellcode. We will focus mostly on shellcoding, but also touch aspects of exploitation to offer a well-rounded understanding.

$575
  • Previous Events
  • Today
  • Google Calendar
  • iCalendar
  • Outlook 365
  • Outlook Live
  • Export .ics file
  • Export Outlook .ics file
Join the Antisyphon Training Discord Server!
  • Twitter
  • LinkedIn
  • Mastodon
PROMPT#

Copyright © 2023 Antisyphon

Powered by PressBook Dark WordPress theme