In-Person
- Events
- In-Person
Practical Physical Exploitation
Tampa, FL Tampa, Florida, United StatesInstructor: Ralph May & Travis WeathersCourse Length: 3 Days, 24 Hours (please note, this is an in-person only class) Includes: Twelve months of complimentary access to the Antisyphon Cyber Range, certificate of participation. Pricing: Location: Course Description Are you a seasoned penetration tester looking to learn how to perform physical security assessments or new to the industry...
Practical Physical Exploitation
Tampa, FL Tampa, Florida, United StatesInstructor: Ralph May & Travis WeathersCourse Length: 3 Days, 24 Hours (please note, this is an in-person only class) Includes: Twelve months of complimentary access to the Antisyphon Cyber Range, certificate of participation. Pricing: Location: Course Description Are you a seasoned penetration tester looking to learn how to perform physical security assessments or new to the industry...
Practical Physical Exploitation w/ Ralph May and Travis Weathers
Tampa, FL Tampa, Florida, United StatesThe Practical Physical Exploitation Course is designed to provide you with everything needed to sell and execute physical security assessments. The key word here is PRACTICAL; everything covered in this course is what you need to know to be successful on your first solo assessment.
Practical Physical Exploitation
Tampa, FL Tampa, Florida, United StatesInstructor: Ralph May & Travis WeathersCourse Length: 3 Days, 24 Hours (please note, this is an in-person only class) Includes: Twelve months of complimentary access to the Antisyphon Cyber Range, certificate of participation. Pricing: Location: Course Description Are you a seasoned penetration tester looking to learn how to perform physical security assessments or new to the industry...
Practical Physical Exploitation w/ Ralph May and Travis Weathers
Tampa, FL Tampa, Florida, United StatesThe Practical Physical Exploitation Course is designed to provide you with everything needed to sell and execute physical security assessments. The key word here is PRACTICAL; everything covered in this course is what you need to know to be successful on your first solo assessment.
Introduction to Pentesting w/ John Strand
Skyline/Ash Brokerage Building 888 S. Harrison St. #500, Fort Wayne, IN, United StatesIn this training course, we will examine the different types of penetration testing engagements and take a deep dive into establishing a repeatable testing methodology for executing quality tests. We will look at some tools of the trade to understand what they are doing under the hood, identify what separates a great finding from a good finding in reports, and really zero in on establishing your own methodology!
Next Level OSINT w/ Mishaal Khan
OnlineThe course progresses from basic to very advanced practical OSINT techniques that you can use in your investigative routine. No special software, operating system, or paid licenses are required. Bookmarks for all tools and websites used will be provided for quick access.
Practical Physical Exploitation w/ Ralph May and Travis Weathers
Tampa, FL Tampa, Florida, United StatesThe Practical Physical Exploitation Course is designed to provide you with everything needed to sell and execute physical security assessments. The key word here is PRACTICAL; everything covered in this course is what you need to know to be successful on your first solo assessment.
Breaching the Cloud w/ Beau Bullock
KernelCon2024 555 S 10th St, Omaha, NebraskaThis training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization.
Hacking Active Directory: Fundamentals and Techniques w/ Dale Hobbs
KernelCon2024 555 S 10th St, Omaha, NebraskaThe majority of enterprise networks today are managed using Microsoft Active Directory and it is crucial for a security professional to understand the current threats to a modern Windows environment.
The course begins with an overview of Active Directory architecture and how it can be leveraged by attackers to gain access to critical assets. Participants will learn about the various attack vectors and methods used to compromise Active Directory, such as password attacks, service abuse and privilege escalation.
Introduction to Python w/ Joff Thyer
KernelCon2024 555 S 10th St, Omaha, NebraskaThis course aims to teach the fundamentals of the Python programming language such that a student will gain a beginning to intermediate level of competency with the language. Labs will be presented in a Capture the Flag (CTF) style format as well as some more comprehensive programming tasks.
Modern Webapp Pentesting II: Webapp Internals w/ BB King
Skyline/Ash Brokerage Building 888 S. Harrison St. #500, Fort Wayne, IN, United StatesModern Webapp Pentesting II: Webapp Internals is written as a followup to Modern Webapp Pentesting. This course builds on the fundamentals and gives you experience with how they apply to current problems in web applications.
Hacking Active Directory: Fundamentals and Techniques w/ Dale Hobbs
Skyline/Ash Brokerage Building 888 S. Harrison St. #500, Fort Wayne, IN, United StatesThe majority of enterprise networks today are managed using Microsoft Active Directory and it is crucial for a security professional to understand the current threats to a modern Windows environment.
The course begins with an overview of Active Directory architecture and how it can be leveraged by attackers to gain access to critical assets. Participants will learn about the various attack vectors and methods used to compromise Active Directory, such as password attacks, service abuse and privilege escalation.