Skip to content
Antisyphon Training

Antisyphon Training

  • Home
  • News & Updates
  • Calendar
  • Training
    • Course Catalog
    • Live Training
      • Live Courses Catalog
      • Live Training Calendar
    • On-Demand Training
      • On-Demand Catalog
      • Security for MSPs
    • Pay What You Can Training
    • Cybersecurity Training for Businesses
    • The Vault Program
    • Training Roadmap
  • Summits
    • Upcoming Summits
    • Past Summits
  • Cyber Range
    • About Our Cyber Range
    • ACE-T™ Certification
    • Purchase Subscription
  • About
    • Mission
    • FAQ
    • Our Instructors
    • Giving Back
    • Testimonials
  • Contact Us
  • Toggle search form
Loading view.

Events Search and Views Navigation

Event Views Navigation

  • List
  • Month
  • Day
  • Summary
Today

Filters

Changing any of the form inputs will cause the list of events to refresh with the filtered results.

Event Category
Cost ($)
Tags
Venues
Day
Time

May 2023

Thu 18
Security Leadership and Management with Chris Brenton
May 18 @ 12:00 pm - 4:00 pm EDT Event Series Security Compliance and Leadership

Security Leadership and Management

Online

Instructor: Chris BrentonCourse Length: 16 Hours Includes: 12 months of complimentary access to the Antisyphon Cyber Range, certificate of participation, six months access to class recordings. Course Description “Security” is arguably one of the most challenging disciplines to move from being an individual contributor (IC) to being a manager. While security ICs can perform most tasks in...

Read more... “Security Leadership and Management” »

Fri 19
Secure Ideas - The Professionally Evil Network Testing (PENT)
May 19 @ 12:00 pm - 4:00 pm EDT Event Series Professionally Evil Network Testing (PENT)

Professionally Evil Network Testing (PENT)

Online

Instructor: Eric Kuehn, Nathan SweaneyCourse Length: 5 days, 20 hours Course Description This hands-on course will teach students a basic methodology for network penetration testing and an introduction to the processes used. Students will walk through the phases of Reconnaissance, Mapping, Discovery, Exploitation, and Post-Exploitation with demonstrations of various tools and tactics used in each...

Read more... “Professionally Evil Network Testing (PENT)” »

Fri 19
Enterprise Forensics and Response
May 19 @ 12:00 pm - 4:00 pm EDT Event Series Enterprise Forensics and Response

Enterprise Forensics and Response

Online

Instructor: Gerard JohansenCourse Length: 16 Hours Course Description The Enterprise Forensics and Response course is designed to provide students with both an investigative construct and techniques that allow them to scale incident response activities in an enterprise environment. The focus of the lecture portion of the course work is understanding the incident investigation process, objective...

Read more... “Enterprise Forensics and Response” »

Fri 19
Security Leadership and Management with Chris Brenton
May 19 @ 12:00 pm - 4:00 pm EDT Event Series Security Compliance and Leadership

Security Leadership and Management

Online

Instructor: Chris BrentonCourse Length: 16 Hours Includes: 12 months of complimentary access to the Antisyphon Cyber Range, certificate of participation, six months access to class recordings. Course Description “Security” is arguably one of the most challenging disciplines to move from being an individual contributor (IC) to being a manager. While security ICs can perform most tasks in...

Read more... “Security Leadership and Management” »

Tue 23
Introduction to Industrial Control Systems with Ashley Van Hoesen
May 23 @ 11:00 am - 4:00 pm EDT Event Series Introduction to Industrial Control Systems

Introduction to Industrial Control Systems

Online

Instructor: Ashley Van HoesenCourse Length: 4 Days, 16 Hours Course Description The Introduction to Industrial Control Systems course provides intensive training on defending and attacking industrial control systems. The course will discuss common vulnerabilities, attack paths, defending industrial control systems, and architecture of industrial control environments. The course will provide hands-on training in a lab...

Read more... “Introduction to Industrial Control Systems” »

Wed 24
Introduction to Industrial Control Systems with Ashley Van Hoesen
May 24 @ 12:00 pm - 4:00 pm EDT Event Series Introduction to Industrial Control Systems

Introduction to Industrial Control Systems

Online

Instructor: Ashley Van HoesenCourse Length: 4 Days, 16 Hours Course Description The Introduction to Industrial Control Systems course provides intensive training on defending and attacking industrial control systems. The course will discuss common vulnerabilities, attack paths, defending industrial control systems, and architecture of industrial control environments. The course will provide hands-on training in a lab...

Read more... “Introduction to Industrial Control Systems” »

Thu 25
Introduction to Industrial Control Systems with Ashley Van Hoesen
May 25 @ 12:00 pm - 4:00 pm EDT Event Series Introduction to Industrial Control Systems

Introduction to Industrial Control Systems

Online

Instructor: Ashley Van HoesenCourse Length: 4 Days, 16 Hours Course Description The Introduction to Industrial Control Systems course provides intensive training on defending and attacking industrial control systems. The course will discuss common vulnerabilities, attack paths, defending industrial control systems, and architecture of industrial control environments. The course will provide hands-on training in a lab...

Read more... “Introduction to Industrial Control Systems” »

Fri 26
Introduction to Industrial Control Systems with Ashley Van Hoesen
May 26 @ 12:00 pm - 4:00 pm EDT Event Series Introduction to Industrial Control Systems

Introduction to Industrial Control Systems

Online

Instructor: Ashley Van HoesenCourse Length: 4 Days, 16 Hours Course Description The Introduction to Industrial Control Systems course provides intensive training on defending and attacking industrial control systems. The course will discuss common vulnerabilities, attack paths, defending industrial control systems, and architecture of industrial control environments. The course will provide hands-on training in a lab...

Read more... “Introduction to Industrial Control Systems” »

June 2023

Tue 6
Getting Started with Packet Decoding with Chris Brenton
June 6 @ 11:00 am - 4:00 pm EDT Event Series Getting Started in Packet Decoding

Getting Started in Packet Decoding

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.

Tue 6
Secure Ideas - Introduction to PCI (PCI 101)
June 6 @ 12:00 pm - 4:00 pm EDT Event Series Introduction to PCI (PCI 101)

Introduction to PCI (PCI 101)

Online

Instructor: Nathan SweaneyCourse Length: 1 Day, 4 HoursPrice: $25-$150 Course Description This course is designed to introduce IT professionals to the Payment Card Industry collection of standards as defined and enforced by the Payment Card Industry Security Standards Council. The first half of the course summarizes the structure and history of PCI, the primary standards...

Read more... “Introduction to PCI (PCI 101)” »

Wed 7
Getting Started with Packet Decoding with Chris Brenton
June 7 @ 12:00 pm - 4:00 pm EDT Event Series Getting Started in Packet Decoding

Getting Started in Packet Decoding

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.

Wed 7
Reporting for Pentesters w/ BB King
June 7 @ 12:00 pm - 4:00 pm EDT

Reporting for Pentesters

If you want to set yourself apart, work on your reporting skills. The hacks are ephemeral. The report lives forever. The hacks are fun – and they require your constant effort to keep current. The reporting is what makes this all a viable career – and once you know how to produce a good one, you can apply that skill endlessly as the computing world changes around you.

Thu 8
Getting Started with Packet Decoding with Chris Brenton
June 8 @ 12:00 pm - 4:00 pm EDT Event Series Getting Started in Packet Decoding

Getting Started in Packet Decoding

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.

Fri 9
Getting Started with Packet Decoding with Chris Brenton
June 9 @ 12:00 pm - 4:00 pm EDT Event Series Getting Started in Packet Decoding

Getting Started in Packet Decoding

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.

Mon 12
SOC Core Skills with John Strand
June 12 @ 11:00 am - 4:00 pm EDT Event Series SOC Core Skills

SOC Core Skills

This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have.

Tue 13
Secure Ideas - Foundational Data Protection Training (FDPT)
June 13 @ 11:00 am - 4:00 pm EDT Event Series Foundational Data Protection Training (FDPT)

Foundational Data Protection Training (FDPT)

This foundational course is designed to provide the basic tools needed to protect the data that is most valuable to your business. Since data is an integral part of an organization's core operations, it's important to build a solid foundation for understanding the considerations and mechanisms related to data protection.

Tue 13
Introduction to Python
June 13 @ 11:00 am - 4:00 pm EDT Event Series Introduction to Python

Introduction to Python

Automating tasks in using scripts in various programming languages is critical to scale up the efforts of a limited security professional talent pool. Penetration testers, incident responders, forensics, and defense professionals need to be able to take existing code and produce stable functional Python tools or be able to debug an issue with an existing tool. This course teaches Python fundamentals with both lecture and labs.

Tue 13
SOC Core Skills with John Strand
June 13 @ 12:00 pm - 4:00 pm EDT Event Series SOC Core Skills

SOC Core Skills

This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have.

Wed 14
Introduction to Python
June 14 @ 11:00 am - 4:00 pm EDT Event Series Introduction to Python

Introduction to Python

Automating tasks in using scripts in various programming languages is critical to scale up the efforts of a limited security professional talent pool. Penetration testers, incident responders, forensics, and defense professionals need to be able to take existing code and produce stable functional Python tools or be able to debug an issue with an existing tool. This course teaches Python fundamentals with both lecture and labs.

Wed 14
SOC Core Skills with John Strand
June 14 @ 12:00 pm - 4:00 pm EDT Event Series SOC Core Skills

SOC Core Skills

This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have.

Wed 14
Secure Ideas - Foundational Data Protection Training (FDPT)
June 14 @ 12:00 pm - 4:00 pm EDT Event Series Foundational Data Protection Training (FDPT)

Foundational Data Protection Training (FDPT)

This foundational course is designed to provide the basic tools needed to protect the data that is most valuable to your business. Since data is an integral part of an organization's core operations, it's important to build a solid foundation for understanding the considerations and mechanisms related to data protection.

Thu 15
Introduction to Python
June 15 @ 11:00 am - 4:00 pm EDT Event Series Introduction to Python

Introduction to Python

Automating tasks in using scripts in various programming languages is critical to scale up the efforts of a limited security professional talent pool. Penetration testers, incident responders, forensics, and defense professionals need to be able to take existing code and produce stable functional Python tools or be able to debug an issue with an existing tool. This course teaches Python fundamentals with both lecture and labs.

Thu 15
SOC Core Skills with John Strand
June 15 @ 12:00 pm - 4:00 pm EDT Event Series SOC Core Skills

SOC Core Skills

This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have.

Fri 16
Introduction to Python
June 16 @ 11:00 am - 4:00 pm EDT Event Series Introduction to Python

Introduction to Python

Automating tasks in using scripts in various programming languages is critical to scale up the efforts of a limited security professional talent pool. Penetration testers, incident responders, forensics, and defense professionals need to be able to take existing code and produce stable functional Python tools or be able to debug an issue with an existing tool. This course teaches Python fundamentals with both lecture and labs.

Wed 21
Anti-Cast | Linux Command Line Dojo – You Can Teach an Old Dog New Tricks w/ Hal Pomeranz
June 21 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | Linux Command Line Dojo

If you’ve been using the Linux command line for a long time, you may have missed out on some sweet new features of common commands that can make your life much better. Join Sensei Hal as we break down some practical examples and demonstrate some useful new functionality.

Free
Mon 26
June 26 @ 11:00 am - 12:00 pm EDT

Talking about the Cybers with Europe

Online

Join Antisyphon, BSides Ume, and other security friends for some cyber talks and a game of Backdoors and Breaches!

Free
Tue 27
Secure Ideas - Red Team Fundamentals for Active Directory
June 27 @ 11:00 am - 4:00 pm EDT Event Series Red Team Fundamentals for Active Directory

Red Team Fundamentals for Active Directory

Online

Red Team Fundamentals for Active Directory course is an 8-hour class focused on explaining the fundamentals of Active Directory and how different aspects can be exploited when performing penetration tests.

$295
Tue 27
Breaching the Cloud with Beau Bullock
June 27 @ 11:00 am - 4:00 pm EDT Event Series Breaching the Cloud w/ Beau Bullock

Breaching the Cloud w/ Beau Bullock

Online

This training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization.

$575
Wed 28
Strengthening Your Blue Teaming Skills Thinking Like an Attacker w Markus Schober
June 28 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | Strengthening Your Blue Teaming Skills: Thinking Like an Attacker

Online

This webcast will explore the vast amount of challenges faced by blue teamers and how they can stay ahead of the curve. Through a ransomware attack example, we’ll discuss the broad range of skills and knowledge needed to respond effectively to advanced threats. We’ll elaborate on how thinking like an attacker and employing a purple teaming approach for skills development has proven to be the best defense for many blue teamers. The session will conclude with a Q&A portion to provide answers on what and how blue teamers need to upskill.

Free
Wed 28
Secure Ideas - Red Team Fundamentals for Active Directory
June 28 @ 12:00 pm - 4:00 pm EDT Event Series Red Team Fundamentals for Active Directory

Red Team Fundamentals for Active Directory

Online

Red Team Fundamentals for Active Directory course is an 8-hour class focused on explaining the fundamentals of Active Directory and how different aspects can be exploited when performing penetration tests.

$295
Wed 28
Breaching the Cloud with Beau Bullock
June 28 @ 12:00 pm - 4:00 pm EDT Event Series Breaching the Cloud w/ Beau Bullock

Breaching the Cloud w/ Beau Bullock

Online

This training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization.

$575
Thu 29
Breaching the Cloud with Beau Bullock
June 29 @ 12:00 pm - 4:00 pm EDT Event Series Breaching the Cloud w/ Beau Bullock

Breaching the Cloud w/ Beau Bullock

Online

This training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization.

$575
Fri 30
Breaching the Cloud with Beau Bullock
June 30 @ 12:00 pm - 4:00 pm EDT Event Series Breaching the Cloud w/ Beau Bullock

Breaching the Cloud w/ Beau Bullock

Online

This training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization.

$575

July 2023

Tue 11
Secure Ideas - The Professionally Evil Container Security (PESEC)
July 11 @ 11:00 am - 4:00 pm EDT Event Series Professionally Evil Container Security (PECSEC)

Professionally Evil Container Security (PECSEC)

Online

This course is designed to cover the core fundamentals of container and container orchestration security. We’ll explore container security concerns, configuration issues, and how to abuse them as an attacker. Then we’ll switch gears and explore the ways that we can prevent the attacks we just carried out. This will all be done in a hands-on lab driven manner. This class is focused primarily on Docker and Kubernetes but many of the core concepts can be applied to other container technologies.

$295
Tue 11
Security Compliance and Leadership with Chris Brenton
July 11 @ 11:00 am - 4:00 pm EDT Event Series Security Compliance and Leadership

Security Compliance and Leadership

Online

In this course, we will cover all of the steps needed to stand up and lead a security team within an organization. We start with a clean slate so that every aspect gets covered. If you are in an environment that already has a security team, this can help fill in the gaps. This course will have a heavy focus on how to integrate the security team with the rest of the business units. We’ll look at strategies for increasing funding, as well as converting “security risks” into “business risks” so they are better understood by the organization’s leadership. The course includes a lot of collateral like a full set of pre-written security policies. The goal is to help you build an effective security team in as little time as possible.

$575
Wed 12
Forensicating Linux LD_PRELOAD Rootkits w/ Hal Pomeranz
July 12 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | Forensicating Linux LD_PRELOAD Rootkits

Online

Widespread availability of PoC Linux LD_PRELOAD rootkits means that even trivial cryptomining attacks are starting to deploy them. This talk demonstrates a simple LD_PRELOAD rootkit and techniques for detecting them in a live response scenario and by memory analysis. Get the jump on your adversaries with this fast-paced, practical introduction.

Free
Wed 12
Secure Ideas - The Professionally Evil Container Security (PESEC)
July 12 @ 12:00 pm - 4:00 pm EDT Event Series Professionally Evil Container Security (PECSEC)

Professionally Evil Container Security (PECSEC)

Online

This course is designed to cover the core fundamentals of container and container orchestration security. We’ll explore container security concerns, configuration issues, and how to abuse them as an attacker. Then we’ll switch gears and explore the ways that we can prevent the attacks we just carried out. This will all be done in a hands-on lab driven manner. This class is focused primarily on Docker and Kubernetes but many of the core concepts can be applied to other container technologies.

$295
Wed 12
Security Compliance and Leadership with Chris Brenton
July 12 @ 12:00 pm - 4:00 pm EDT Event Series Security Compliance and Leadership

Security Compliance and Leadership

Online

In this course, we will cover all of the steps needed to stand up and lead a security team within an organization. We start with a clean slate so that every aspect gets covered. If you are in an environment that already has a security team, this can help fill in the gaps. This course will have a heavy focus on how to integrate the security team with the rest of the business units. We’ll look at strategies for increasing funding, as well as converting “security risks” into “business risks” so they are better understood by the organization’s leadership. The course includes a lot of collateral like a full set of pre-written security policies. The goal is to help you build an effective security team in as little time as possible.

$575
Thu 13
Security Compliance and Leadership with Chris Brenton
July 13 @ 12:00 pm - 4:00 pm EDT Event Series Security Compliance and Leadership

Security Compliance and Leadership

Online

In this course, we will cover all of the steps needed to stand up and lead a security team within an organization. We start with a clean slate so that every aspect gets covered. If you are in an environment that already has a security team, this can help fill in the gaps. This course will have a heavy focus on how to integrate the security team with the rest of the business units. We’ll look at strategies for increasing funding, as well as converting “security risks” into “business risks” so they are better understood by the organization’s leadership. The course includes a lot of collateral like a full set of pre-written security policies. The goal is to help you build an effective security team in as little time as possible.

$575
Fri 14
Security Compliance and Leadership with Chris Brenton
July 14 @ 12:00 pm - 4:00 pm EDT Event Series Security Compliance and Leadership

Security Compliance and Leadership

Online

In this course, we will cover all of the steps needed to stand up and lead a security team within an organization. We start with a clean slate so that every aspect gets covered. If you are in an environment that already has a security team, this can help fill in the gaps. This course will have a heavy focus on how to integrate the security team with the rest of the business units. We’ll look at strategies for increasing funding, as well as converting “security risks” into “business risks” so they are better understood by the organization’s leadership. The course includes a lot of collateral like a full set of pre-written security policies. The goal is to help you build an effective security team in as little time as possible.

$575
Wed 19
Anti-Cast | The Sysmon Update is Here w/ Gerard Johansen
July 19 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | The Sysmon Update is Here

Online

The long-awaited update to Sysmon is here!

Microsoft has recently released version 15. This updated version of the popular logging tool includes new features and provides responders insight into endpoint behavior.

In this Anti-Cast, Gerard Johansen, digital forensics practitioner and course author of Enterprise Forensics and Response will walk through how Sysmon can aid in incident investigations.

Free
Wed 26
Anti-Cast | OSINT Uncovered: Unlocking the Hidden Gems of Online Information w/ Mishaal Khan
July 26 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | OSINT Uncovered: Unlocking the Hidden Gems of Online Information

Online

This Anti-Cast session explores advanced techniques and tools for extracting valuable information from diverse online platforms, social media, public databases, and breaches. By emphasizing responsible approaches to OSINT, attendees will learn how to navigate vast data sources, analyze digital footprints, and uncover the hidden gems of online information. Learn to harness the power of OSINT, as Mishaal walks you through some quick OSINT demos. Stalkers not allowed!

Free

August 2023

Wed 2
Anti-Cast | Obtaining NetNTLM Hashes by Asking Nicely w/ Qasim Ijaz & Jake Nelson
August 2 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | Obtaining NetNTLM Hashes by Asking Nicely

Online

Active Directory loves spewing hashes, all kinds of them. This talk will focus on NetNTLM (or NTLM, call it what you will) hashes. We'll chat about how they can be obtained and used for privilege escalation and lateral movement.

Free
Wed 9
Anti-Cast | Down with the CISO w/ Nathan Case
August 9 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | Down with the CISO

Online

This webcast overviews why enterprises split into operations, development, and security. Why it made sense to split technology up this way, how we were wrong to do it, and what we should do now.

Free
Wed 16
Anti-Cast | XFS Forensics with xfs_db w/ Hal Pomeranz
August 16 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | XFS Forensics with xfs_db

Online

Despite being a common Linux file system, forensic support for XFS is still largely lacking. In this session, Hal will describe how to turn the humble xfs_db tool into a useful forensic application for examining XFS file system internals and finding critical evidence. Attackers aren’t the only ones who can “live off the land”!

Free
Tue 22
Talking About the Cybers with Europe, 22 August 2023
August 22 @ 1:00 pm - 3:00 pm EDT

Talking About the Cybers Invades Europe Again!

Online

Join Antisyphon, BSides Kraków, and other security friends for some cyber talks, Cubicles & Compromises, and so much more!

Free
Wed 23
We're getting the band back together! Antisyphon Blue Team Summit, August 23rd, 11AM-4PM EDT. Join us for two tracks filled with great talks, a CTF, and post-summit training!
Featured Featured August 23 @ 11:00 am - August 25 @ 5:00 pm EDT Event Series Blue Team Summit 2023

Blue Team Summit & Training

Online

Blue Teamers have it rough, so we’re putting together an online summit event just for them featuring talks, trainings, and lots of fun and frivolity! The Antisyphon Blue Team Summit 2023 is scheduled for August 23, 2023, with training August 24-25, 2023.

Free
Wed 23
Craig Bowser, Senior Security Architect at GuidePoint Security.
August 23 @ 11:30 am - 12:00 pm EDT Event Series Blue Team Summit 2023

Blue Team Talk: Baby Steps to the Future – Evolving into the Next-Gen SOC

Online

Most SOCs are unable to keep up with the attacks of today because they are constrained by a structure built to address the opt tempo of yesterday. That structure does not scale to protect the rapidly changing, distributed environments that SOCs are required to defend from attackers that have risen in both number and sophistication. To counter, SOCs must evolve to become 'Next-Gen'. This talk will define that term and present concrete steps organizations can take to evolve from today's rigid structures into a dynamic, agile entity that can quickly react to threats of today and tomorrow.

Free
Wed 23
Ed Miro
August 23 @ 11:30 am - 12:00 pm EDT Event Series Blue Team Summit 2023

Blue Team Talk: Social Engineering the Ultimate Adversary: Yourself!

Online

I've always been fascinated by social engineering. How it's a factor in over 90% of all breaches. And how it can also work against self described social engineering subject matter experts. How can this be? This is just the tip of the psychological iceberg… Consider that the placebo effect can still work, even when you know it's a placebo.

Free
Wed 23
Jonathan Rogers, Cybersecurity Analyst and Awareness Specialist.
August 23 @ 12:00 pm - 12:30 pm EDT Event Series Blue Team Summit 2023

Blue Team Talk: Who’s Been Stealing All the Cookies from the Cookie Jar?

Online

Attackers target cookies because they’re valuable and hijacking them can give them great results, like bypassing multi factor authentication. This is great for an attacker but makes a cybersecurity professional cry. Learn how cookie hijacking attack works, and ways we can detect and defend against this kind of attack.

Free
Wed 23
Jenna Lawrence, Security Engineer at L2 Cyber Solutions.
August 23 @ 12:00 pm - 12:30 pm EDT Event Series Blue Team Summit 2023

Blue Team Talk: Documentation: The First Line of Defense

Online

Documentation is arguably one of the most important first lines of defense when it comes to securing assets in any organization. Very few people enjoy writing documentation, or updating it, but it is one of the biggest skills every security team must have to be successful. Without helpful documentation, proper standardization and communication is at risk. This presentation will go through why documentation is so important and how to write good documentation.

Free
Wed 23
Sean Goodwin, Senior Manager in Wolf & Company P.C's DenSecure group.
August 23 @ 12:30 pm - 1:00 pm EDT Event Series Blue Team Summit 2023

Blue Team Talk: 7 Ways to Frustrate Attackers

Online

As the daily barrage of headlines continues to roll in, it is easy to feel deflated as a cybersecurity defender. Most first-time penetration tests follow a standard attack path based on these common weaknesses and misconfigurations. Not surprisingly, these are the same techniques used in real-world attacks. What if you could flip the script on those attackers (authorized or not)?

Free
Wed 23
Anton Ovrutsky, speaker, volunteer, OSCE, OSCP, CISSP, CSSP, KCNA.
August 23 @ 12:30 pm - 1:00 pm EDT Event Series Blue Team Summit 2023

Blue Team Talk: Cloud Security: Why the Endpoint Still Matters

Online

Today, detection engineers and blue teamers are focused on cloud threat detection. However, are we thinking about these threats holistically?

Free
Wed 23
Dr. Catherine J. Ullman, Principal Technology Architect, Security, at the University at Buffalo.
August 23 @ 1:00 pm - 1:30 pm EDT Event Series Blue Team Summit 2023

Blue Team Talk: Defending Beyond Defense

Online

Assumptions burn defenders every day. Perhaps the most pernicious one is that systems and their controls will always work as designed. Best practices in security may be good guidelines, but unfortunately also suffer from these same blind spots. For example, best practice recommends the use of LAPS for local administrator account passwords of domain-joined computers, yet misconfiguration of active directory can turn it from a protective control into a vulnerability. But what if there was a way to challenge these assumptions up front?

Free
Wed 23
Dwayne McDaniel
August 23 @ 1:00 pm - 1:30 pm EDT Event Series Blue Team Summit 2023

Blue Team Talk: Who Goes There? Actively Detecting Intruders With Honeytokens

Online

Intrusion detection works best when you can discover the attacker while they are still in the system. Finding out after the fact does little to protect your systems and your data. Ideally, you would want to set an alarm that an attacker would trigger while limiting the damage to your environment. We know from many recent breaches that attackers commonly try to expand their foothold in a system by finding and exploiting hardcoded credentials in environments they have accessed. We can use these behavioral patterns to our advantage by engaging in defensive cyber deception.

Free
Wed 23
Kelli Tarala, founder, owner, and principal security researcher of the subscription service platform, Auditscripts.
August 23 @ 1:30 pm - 2:00 pm EDT Event Series Blue Team Summit 2023

Blue Team Talk: Why Your Company Needs an AI Policy Right Now

Online

A Machine Learning (ML) / Artificial Intelligence (AI) Cybersecurity Policy is essential to protect your organization from evolving threats. It establishes guidelines to safeguard data privacy, address risk management, and implement employee guidance and training. Join us for a 30 minute presentation covering the crucial reasons why your organization needs to implement a ML/AI Policy.

Free
Wed 23
John Stoner
August 23 @ 1:30 pm - 2:00 pm EDT Event Series Blue Team Summit 2023

Blue Team Talk: I Want The Log I Can’t Have

Online

If you're like me, you have spent some portion of your career working with events generated from on-premise systems. With the move toward cloud, I noticed that logs that I took for granted and expected to have were no longer available. The intent of this talk is to drive greater awareness of what the defender will see (and more importantly what they will not see) when a signing key certificate is extracted, a SAML token forged and access token is utilized in an Azure AD / M365 environment.

Free
Wed 23
Alissa Torres
August 23 @ 2:00 pm - 2:30 pm EDT Event Series Blue Team Summit 2023

Blue Team Talk: Big Mad Blue Team

Online

Does your environment pose unique security challenges that require special deviations from industry standard? Do you justify the diminutive size of your SOC/hunt/intel teams by pointing to how smart they are? Has the motto of your team’s onboarding become “they may be best practices but they aren’t our practices”? Welcome to the blue team logical fallacy follies talk.

Free
Wed 23
Jeremy Mio & Amanda Berlin
August 23 @ 2:00 pm - 3:00 pm EDT Event Series Blue Team Summit 2023

Blue Team Talk: Level Up: Mastering the Game of Threats through Table Tops and Bots!

Online

In our talk, we will explore the use of table top exercises in cybersecurity, focusing on their role in enhancing incident response capabilities. We'll dive into the concept of gamifying these exercises for improved engagement and efficiency.

Table Top gamified experiences can be used to build and continually update incident response playbooks, ensuring relevance in a rapidly evolving threat landscape. Any on at this talk will leave with practical strategies for integrating table tops into their cybersecurity toolkit!

We will also present an interactive demo… Can you survive the Cyber Game Master bot!?

Free
Wed 23
James Bierly
August 23 @ 2:30 pm - 3:00 pm EDT Event Series Blue Team Summit 2023

Blue Team Talk: Managing the Unmanageable: Defending the SMB

Online

Over 13 million Small businesses have 9 or fewer employees. This is over 90% of businesses in the United States alone. In this talk we will look at the challenges and how to overcome them from Ownership buy-in, lack of resources and vendor apathy.

Free
Wed 23
Joe Gray
August 23 @ 3:00 pm - 4:00 pm EDT Event Series Blue Team Summit 2023

Blue Team Talk: Social Engineering Your Metrics: Using Data Science to Provide Value in Reporting

Online

Reporting is generally boring. As social engineers, we often get wrapped up in the hustle and bustle of performing the engagement and report writing falls to the side. While the reports do go out and we meet client obligations, a serious question arises: Are we providing meaningful measurements, metrics, and advice to the client?

Free
Thu 24
Intro to Offensive Tooling w/ Chris Traynor
August 24 @ 9:00 am - 2:00 pm EDT Event Series Blue Team Summit 2023

Intro to Offensive Tooling

Online

This hands-on course covers a variety of offensive tools, such as Nmap, Recon-ng, Metasploit, Proxychains, Responder, and many more. Through a series of practical labs, you will gain experience in using these tools to assess the security of systems and networks. In addition to learning how to use these tools effectively, you will also explore the ethical considerations surrounding offensive tooling, how to responsibly use these tools to protect sensitive information, and prevent cyber attacks.

$295
Thu 24
Introduction to Python
August 24 @ 9:00 am - 6:00 pm EDT Event Series Blue Team Summit 2023

Introduction to Python

Online

Blue teams need all the help they can get, and automating tasks in using scripts in various programming languages is critical to scale up the efforts of a limited security professional talent pool. Incident responders, forensicators, and other defense professionals need to be able to take existing code and produce stable functional Python tools or be able to debug an issue with an existing tool. This course teaches Python fundamentals with both lecture and labs.

$575
Thu 24
Enterprise Forensics and Response
August 24 @ 9:00 am - 6:00 pm EDT Event Series Blue Team Summit 2023

Enterprise Forensics and Response

Online

The Enterprise Forensics and Response course is designed to provide students with both an investigative construct and techniques that allow them to scale incident response activities in an enterprise environment. The focus of the lecture portion of the course work is understanding the incident investigation process, objective oriented analysis and response, intrusion analysis and an exploration of attacker Tactics and Techniques.

$575
Thu 24
Advanced Network Threat Hunting with Chris Brenton
August 24 @ 9:00 am - 6:00 pm EDT Event Series Blue Team Summit 2023

Advanced Network Threat Hunting

Online

So far we’ve had over 21,000 students attend our one-day network threat hunting course. Many have asked that we provide an extended class with more hands-on lab time. That is exactly what we have rolled into this 16-hour course!

$575
Thu 24
Incident Response Foundations with Derek Banks
August 24 @ 9:00 am - 6:00 pm EDT Event Series Blue Team Summit 2023

Incident Response Foundations

Online

This class involves analyzing PCAP files for Command and Control (C2) communications in order to identify malware back channels. It is assumed that the student will already understand the basics of network threat hunting, so we can immediately jump into applying that knowledge. The goal will be to create a threat hunting runbook that you can use within your own organization in order to identify systems that have been compromised.

$575
Thu 24
August 24 @ 9:00 am - 6:00 pm EDT Event Series Blue Team Summit 2023

OSINT Mastery Class

Online

The "OSINT Mastery Class" is a comprehensive, 16-hour training program designed to offer participants an in-depth exploration of open-source intelligence (OSINT) methodologies. This training delves into investigating businesses, image analysis, and search engine intelligence. Participants will learn about key strategies and practical techniques to harness publicly available information for a variety of purposes such as corporate due diligence, background checks, security analysis, competitive intelligence, and more. The course is hands-on, allowing participants to directly apply their learning through real-world scenarios, case studies, and practical exercises. By the end of the course, participants will have mastered advanced OSINT techniques and tools, positioning themselves to effectively gather, analyze, and interpret open-source data.

$575
Thu 24
MITRE ATT&CK Framework and Tools, with Carrie Roberts
August 24 @ 10:00 am - 2:00 pm EDT Event Series Blue Team Summit 2023

MITRE ATT&CK Framework and Tools

Online

The MITRE Organization has provided several useful and free tools for working in the cybersecurity space. One of these tools, the MITRE ATT&CK Framework, has become the industry standard for talking about and organizing attacker tactics and techniques. In this introductory class we will look at the information provided in the framework and use various tools, including the ATT&CK Navigator, for visualizing and sharing information. A brief overview of other MITRE tools including CVE/CWE, ATT&CK Flow, ATT&CK Powered Suit, ATT&CK Evaluations, and the Adversary Emulation Library will be given. You will be provided with hands-on lab instructions for creating visualizations using the MITRE ATT&CK Navigator and for searching through ATT&CK data with the convention web browser extension. At the end of this class, you will have the knowledge and tools to talk about and work with the MITRE ATT&CK Framework and Tools. 

$25 – $150
Fri 25
Intro to Offensive Tooling w/ Chris Traynor
August 25 @ 10:00 am - 2:00 pm EDT Event Series Blue Team Summit 2023

Intro to Offensive Tooling

Online

This hands-on course covers a variety of offensive tools, such as Nmap, Recon-ng, Metasploit, Proxychains, Responder, and many more. Through a series of practical labs, you will gain experience in using these tools to assess the security of systems and networks. In addition to learning how to use these tools effectively, you will also explore the ethical considerations surrounding offensive tooling, how to responsibly use these tools to protect sensitive information, and prevent cyber attacks.

$295
Fri 25
Introduction to Python
August 25 @ 10:00 am - 6:00 pm EDT Event Series Blue Team Summit 2023

Introduction to Python

Online

Blue teams need all the help they can get, and automating tasks in using scripts in various programming languages is critical to scale up the efforts of a limited security professional talent pool. Incident responders, forensicators, and other defense professionals need to be able to take existing code and produce stable functional Python tools or be able to debug an issue with an existing tool. This course teaches Python fundamentals with both lecture and labs.

$575
Fri 25
Enterprise Forensics and Response
August 25 @ 10:00 am - 6:00 pm EDT Event Series Blue Team Summit 2023

Enterprise Forensics and Response

Online

The Enterprise Forensics and Response course is designed to provide students with both an investigative construct and techniques that allow them to scale incident response activities in an enterprise environment. The focus of the lecture portion of the course work is understanding the incident investigation process, objective oriented analysis and response, intrusion analysis and an exploration of attacker Tactics and Techniques.

$575
Fri 25
Advanced Network Threat Hunting with Chris Brenton
August 25 @ 10:00 am - 6:00 pm EDT Event Series Blue Team Summit 2023

Advanced Network Threat Hunting

Online

So far we’ve had over 21,000 students attend our one-day network threat hunting course. Many have asked that we provide an extended class with more hands-on lab time. That is exactly what we have rolled into this 16-hour course!

$575
Fri 25
Incident Response Foundations with Derek Banks
August 25 @ 10:00 am - 6:00 pm EDT Event Series Blue Team Summit 2023

Incident Response Foundations

Online

This class involves analyzing PCAP files for Command and Control (C2) communications in order to identify malware back channels. It is assumed that the student will already understand the basics of network threat hunting, so we can immediately jump into applying that knowledge. The goal will be to create a threat hunting runbook that you can use within your own organization in order to identify systems that have been compromised.

$575
Fri 25
August 25 @ 10:00 am - 6:00 pm EDT Event Series Blue Team Summit 2023

OSINT Mastery Class

Online

The "OSINT Mastery Class" is a comprehensive, 16-hour training program designed to offer participants an in-depth exploration of open-source intelligence (OSINT) methodologies. This training delves into investigating businesses, image analysis, and search engine intelligence. Participants will learn about key strategies and practical techniques to harness publicly available information for a variety of purposes such as corporate due diligence, background checks, security analysis, competitive intelligence, and more. The course is hands-on, allowing participants to directly apply their learning through real-world scenarios, case studies, and practical exercises. By the end of the course, participants will have mastered advanced OSINT techniques and tools, positioning themselves to effectively gather, analyze, and interpret open-source data.

$575
Tue 29
Introduction to Industrial Control Systems with Ashley Van Hoesen
August 29 @ 11:00 am - 4:00 pm EDT Event Series Introduction to Industrial Control Systems

Introduction to Industrial Control Systems

Online

Introduction to Industrial Control Systems provides intensive training on defending and attacking industrial control systems. The course will discuss common vulnerabilities, attack paths, defending industrial control systems, and architecture of industrial control environments. This course will provide hands-on training in a lab setting while attacking and securing a virtual factory.

$575
Wed 30
Anti-Cast | Exploring PowerShell Logging with TellTail w/ Carrie Roberts
August 30 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | Exploring PowerShell Logging with TellTail

Online

TellTail is a free and open-source application that makes it easy to view and learn about PowerShell logging. In this webcast, we will enable/disable the various PowerShell logging options and watch the effect it has on what gets logged. Come to this webcast to learn more about PowerShell Script Block and Module logging and how you can easily explore and learn on your own.

Free
Wed 30
Introduction to Industrial Control Systems with Ashley Van Hoesen
August 30 @ 12:00 pm - 4:00 pm EDT Event Series Introduction to Industrial Control Systems

Introduction to Industrial Control Systems

Online

Introduction to Industrial Control Systems provides intensive training on defending and attacking industrial control systems. The course will discuss common vulnerabilities, attack paths, defending industrial control systems, and architecture of industrial control environments. This course will provide hands-on training in a lab setting while attacking and securing a virtual factory.

$575
Thu 31
Introduction to Industrial Control Systems with Ashley Van Hoesen
August 31 @ 12:00 pm - 4:00 pm EDT Event Series Introduction to Industrial Control Systems

Introduction to Industrial Control Systems

Online

Introduction to Industrial Control Systems provides intensive training on defending and attacking industrial control systems. The course will discuss common vulnerabilities, attack paths, defending industrial control systems, and architecture of industrial control environments. This course will provide hands-on training in a lab setting while attacking and securing a virtual factory.

$575

September 2023

Fri 1
Introduction to Industrial Control Systems with Ashley Van Hoesen
September 1 @ 12:00 pm - 4:00 pm EDT Event Series Introduction to Industrial Control Systems

Introduction to Industrial Control Systems

Online

Introduction to Industrial Control Systems provides intensive training on defending and attacking industrial control systems. The course will discuss common vulnerabilities, attack paths, defending industrial control systems, and architecture of industrial control environments. This course will provide hands-on training in a lab setting while attacking and securing a virtual factory.

$575
Wed 6
Anti-Cast | The Wrong Beer to the Barbecue w/ Alissa Torres
September 6 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | The Wrong Beer to the Barbecue: BYOVD Attacks (BYOVD: Bring Your Own Vulnerable Driver)

Online

Based on recent threat reports, a growing number of bad actors are bringing vulnerable drivers to victim environments to exploit and guarantee a more successful attack path. These kernel drivers are legitimate, trusted and... vulnerable! Amazingly, some have CVEs dating back to 2015 or earlier. During this Anti-Cast, we will map out detection methods to identify and remove vulnerable drivers already present in your network AND devise prevent/block strategies to future-proof against BYOVD attacks.

Free
Wed 6
Professionally Evil Application Security (PEAS): Mastering Application Reconnaissance and Mapping
September 6 @ 12:00 pm - 4:00 pm EDT Event Series Professionally Evil Application Security (PEAS)

Professionally Evil Application Security (PEAS): Mastering Application Reconnaissance and Mapping

Online

Embark on a journey into the world of web security with Mastering Application Reconnaissance and Mapping. As part of the Professionally Evil Application Security series, this course focuses on the crucial aspects of reconnaissance and mapping within the application penetration testing methodology.  Whether you're a seasoned professional or a curious newcomer, this course will equip you with the foundational knowledge and practical skills to assess web applications against potential vulnerabilities. 

$25 – $150
Tue 12
Linux Forensics with Hal Pomeranz
September 12 @ 9:00 am - 5:00 pm EDT Event Series Linux Forensics

Linux Forensics

Online

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.

$1095
Tue 12
Professionally Evil API Testing: A Practical Course for Beginners
September 12 @ 11:00 am - 3:00 pm EDT Event Series Professionally Evil API Testing

Professionally Evil API Testing: A Practical Course for Beginners

Online

If you want to learn how to perform security testing on web applications that use application programming interfaces (APIs), this course is for you. APIs are the connective tissue responsible for transferring information between systems, both internally and externally. They are also a common target for cyberattacks, as they can expose sensitive data, application logic, and internal infrastructure.

$25 – $150
Tue 12
Secure Ideas - Professionally Evil CISSP Mentorship
September 12 @ 2:00 pm - 4:00 pm EDT Event Series Professionally Evil CISSP Mentorship Program

Professionally Evil CISSP Mentorship Program

Online

ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.

$100 – $1000
Wed 13
Linux Forensics with Hal Pomeranz
September 13 @ 9:00 am - 5:00 pm EDT Event Series Linux Forensics

Linux Forensics

Online

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.

$1095
Wed 13
Anti-Cast | Credential Compartmentalization in Active Director w/ Eric Kuehn
September 13 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | Credential Compartmentalization in Active Directory

Online

When it comes to security, the goal is to make an attacker’s job as difficult as possible. The more hurdles they must jump through, the easier it should be to detect and stop them. Unfortunately, common practices around how and where privileged accounts are used in Windows environments reduces the race down to only a couple of jumps (or maybe just a sprint). We will talk about why device and account tiering is critically important for making a network a virtual obstacle course.

Free
Wed 13
Professionally Evil Container Security (PECSEC) - Out of the Box: Strategies for Escaping from Containers w/ Cory Sabol
September 13 @ 12:00 pm - 4:00 pm EDT Event Series Professionally Evil Container Security (PECSEC)

Professionally Evil Container Security (PECSEC) – Out of the Box: Strategies for Escaping from Containers

Online

This immersive training course invites participants to delve into the world of container technologies and learn about container escape techniques. Often, container environments are seen as safe spaces; this course, however, challenges that perspective by demonstrating ways in which these seemingly secure environments can be compromised. Through a series of interactive exercises and real-world examples, participants will learn how to identify weaknesses in container configurations and how to escape from containerized environments. This course is ideal for anyone involved with container technologies, keen to enhance their security skills.

$25 – $150
Thu 14
Linux Forensics with Hal Pomeranz
September 14 @ 9:00 am - 5:00 pm EDT Event Series Linux Forensics

Linux Forensics

Online

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.

$1095
Fri 15
Linux Forensics with Hal Pomeranz
September 15 @ 9:00 am - 5:00 pm EDT Event Series Linux Forensics

Linux Forensics

Online

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.

$1095
Mon 18
Getting Started in Security with BHIS and MITRE ATT&CK with John Strand
September 18 @ 11:00 am - 4:00 pm EDT Event Series Getting Started in Security with BHIS and MITRE ATT&CK

Getting Started in Security with BHIS and MITRE ATT&CK

Online

This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful.

$575
Tue 19
Getting Started in Security with BHIS and MITRE ATT&CK with John Strand
September 19 @ 12:00 pm - 4:00 pm EDT Event Series Getting Started in Security with BHIS and MITRE ATT&CK

Getting Started in Security with BHIS and MITRE ATT&CK

Online

This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful.

$575
Tue 19
Secure Ideas - Professionally Evil CISSP Mentorship
September 19 @ 2:00 pm - 4:00 pm EDT Event Series Professionally Evil CISSP Mentorship Program

Professionally Evil CISSP Mentorship Program

Online

ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.

$100 – $1000
Wed 20
Anti-Cast | API-ocalypse Now w/ Jennifer Shannon
September 20 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | API-ocalypse Now

Online

Get ready for a wild ride as Jennifer Shannon, a Senior Security Consultant at Secure Ideas, presents "API-ocalypse Now." In this thrilling and entertaining webcast, Jennifer will showcase the vulnerabilities lurking within APIs and the havoc they can wreak if left unaddressed. Through live pentesting demos, she will demonstrate jaw-dropping exploits, mind-bending injection attacks, and authentication bypass techniques that will leave you on the edge of your seat. Join Jennifer as she navigates the dark side of APIs to help you understand and fortify your attack surface in order to prevent the impending API-ocalypse.

Free
Wed 20
Getting Started in Security with BHIS and MITRE ATT&CK with John Strand
September 20 @ 12:00 pm - 4:00 pm EDT Event Series Getting Started in Security with BHIS and MITRE ATT&CK

Getting Started in Security with BHIS and MITRE ATT&CK

Online

This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful.

$575
Thu 21
Getting Started in Security with BHIS and MITRE ATT&CK with John Strand
September 21 @ 12:00 pm - 4:00 pm EDT Event Series Getting Started in Security with BHIS and MITRE ATT&CK

Getting Started in Security with BHIS and MITRE ATT&CK

Online

This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful.

$575
Tue 26
Secure Ideas - Red Team Fundamentals for Active Directory
September 26 @ 11:00 am - 4:00 pm EDT Event Series Red Team Fundamentals for Active Directory

Red Team Fundamentals for Active Directory

Online

Red Team Fundamentals for Active Directory course is an 8-hour class focused on explaining the fundamentals of Active Directory and how different aspects can be exploited when performing penetration tests.

$295
Tue 26
Secure Ideas - Professionally Evil CISSP Mentorship
September 26 @ 2:00 pm - 4:00 pm EDT Event Series Professionally Evil CISSP Mentorship Program

Professionally Evil CISSP Mentorship Program

Online

ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.

$100 – $1000
Wed 27
Anti-Cast | Infiltrating Kubernetes: Attacker Motives and Methods w/ Cory Sabol
September 27 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | Infiltrating Kubernetes: Attacker Motives and Methods

Online

In this one-hour webinar, we will explore an overview of the threats targeting Kubernetes, a crucial technology for managing containerized applications. “Infiltrating Kubernetes: An Overview of Attacker Motives and Methods,” aims to equip IT professionals, DevOps engineers, and cybersecurity enthusiasts with insights into why and how attackers infiltrate Kubernetes environments. 

Free
Wed 27
Secure Ideas - Red Team Fundamentals for Active Directory
September 27 @ 12:00 pm - 4:00 pm EDT Event Series Red Team Fundamentals for Active Directory

Red Team Fundamentals for Active Directory

Online

Red Team Fundamentals for Active Directory course is an 8-hour class focused on explaining the fundamentals of Active Directory and how different aspects can be exploited when performing penetration tests.

$295
  • Previous Events
  • Today
  • Next Events
  • Google Calendar
  • iCalendar
  • Outlook 365
  • Outlook Live
  • Export .ics file
  • Export Outlook .ics file
Join the Antisyphon Training Discord Server!
  • Twitter
  • LinkedIn
  • Mastodon
PROMPT#

Copyright © 2023 Antisyphon

Powered by PressBook Dark WordPress theme