Calendar of Events
S Sun
M Mon
T Tue
W Wed
T Thu
F Fri
S Sat
0 events,
0 events,
1 event,
Professionally Evil CISSP Mentorship Program
Professionally Evil CISSP Mentorship Program
ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
1 event,
Anti-Cast | Security Split: Divorcing Your Stack w/ Alissa Torres w/ Alissa Torres
Anti-Cast | Security Split: Divorcing Your Stack w/ Alissa Torres w/ Alissa Torres
So your security team is convinced it needs to graduate to the newest "best" enterprise security tool, I get it. But for most, this type of architecture shift requires careful planning and implementation. For legacy tools, you probably made concessions during onboarding, accepted risks and grew product-specific dependencies. Join us for a free one-hour Antisyphon...
Read more... “Anti-Cast | Security Split: Divorcing Your Stack w/ Alissa Torres w/ Alissa Torres” »
3 events,
Antisyphon Training @ BSides Fort Wayne 2024
Antisyphon Training @ BSides Fort Wayne 2024
Antisyphon Training will be at BSidesFortWayne this Fort Wayne, IN, this May!
Modern Webapp Pentesting II: Webapp Internals w/ BB King
Modern Webapp Pentesting II: Webapp Internals w/ BB King
Modern Webapp Pentesting II: Webapp Internals is written as a followup to Modern Webapp Pentesting. This course builds on the fundamentals and gives you experience with how they apply to current problems in web applications.
Hacking Active Directory: Fundamentals and Techniques w/ Dale Hobbs
Hacking Active Directory: Fundamentals and Techniques w/ Dale Hobbs
The majority of enterprise networks today are managed using Microsoft Active Directory and it is crucial for a security professional to understand the current threats to a modern Windows environment.
The course begins with an overview of Active Directory architecture and how it can be leveraged by attackers to gain access to critical assets. Participants will learn about the various attack vectors and methods used to compromise Active Directory, such as password attacks, service abuse and privilege escalation.
0 events,
0 events,
0 events,
1 event,
Professionally Evil CISSP Mentorship Program
Professionally Evil CISSP Mentorship Program
ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
1 event,
Anti-Cast | 60min Crash Course into Infosec w/ Bill McCauley
Anti-Cast | 60min Crash Course into Infosec w/ Bill McCauley
Join us for a one-hour Antisyphon Anti-cast with instructor Bill McCauley from Secure Ideas, as he dives into a high-level webapp pentest walkthrough, covering recon, mapping, reporting, and more, with access to a hosted SamuraiWTF environment.
0 events,
0 events,
0 events,
0 events,
1 event,
Active Defense & Cyber Deception w/ John Strand
Active Defense & Cyber Deception w/ John Strand
In this class, you will learn how to force an attacker to take more moves to attack your network. These moves may increase your ability to detect them. You will learn how to gain better attribution as to who is attacking you and why. You will also find out how to get access to a bad guy’s system. And most importantly, you will find out how to do the above legally.
2 events,
Anti-Cast | Threat Models, Landscape, and Profiles OH MY w/ Wade Wells
Anti-Cast | Threat Models, Landscape, and Profiles OH MY w/ Wade Wells
This free one-hour Antisyphon Anti-Cast with instructor Wade Wells offers an insightful overview of cyber threat landscaping, threat modeling, and threat profiling.
0 events,
0 events,
0 events,
1 event,
SOC Core Skills w/ John Strand
SOC Core Skills w/ John Strand
This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have.
2 events,
Professionally Evil Application Security (PEAS): Mastering Application Reconnaissance and Mapping
Professionally Evil Application Security (PEAS): Mastering Application Reconnaissance and Mapping
Embark on a journey into the world of web security with Mastering Application Reconnaissance and Mapping. As part of the Professionally Evil Application Security series, this course focuses on the crucial aspects of reconnaissance and mapping within the application penetration testing methodology. Whether you're a seasoned professional or a curious newcomer, this course will equip you with the foundational knowledge and practical skills to assess web applications against potential vulnerabilities.
3 events,
Professionally Evil Application Security (PEAS): Unveiling Server-Side Discovery and Exploitation
Professionally Evil Application Security (PEAS): Unveiling Server-Side Discovery and Exploitation
Welcome to the world of application security, where you'll unravel the hidden flaws lurking within server-side portions of web applications. Join us for the second course in the Professionally Evil Application Security series.
Anti-Cast | Offensive Wireless for Red Teams w/ Alex Sanders
Anti-Cast | Offensive Wireless for Red Teams w/ Alex Sanders
Join us for a free one-hour Antisyphon Anti-cast with Alex Sander, as he discusses the differences between penetration testing and red team operations, applications of various wireless protocols in the enterprise, and showcases tooling for attackers and defenders alike.
2 events,
Professionally Evil Application Security (PEAS): Mastering Client-Side Flaws and Exploitation
Professionally Evil Application Security (PEAS): Mastering Client-Side Flaws and Exploitation
Embark on the finale of our Professionally Evil Application Security series with our course, Mastering Client-Side Flaws and Exploitation. In this session, you'll uncover the secrets of client-side vulnerabilities and learn how to secure web applications against potential threats.
0 events,
0 events,
0 events,
0 events,
0 events,
1 event,
Anti-Cast | Realistic End-to-End Attacks & Detective Controls w/ Jeff McJunkin
Anti-Cast | Realistic End-to-End Attacks & Detective Controls w/ Jeff McJunkin
Jeff reveals the five ways outside attackers gain internal access and outlines three core defender objectives: Reducing initial access, lowering detection and response time, slowing down the attackers. Discover actionable insights through three live, realistic breach demonstrations into detective controls and slowing down attackers.
0 events,
0 events,
0 events,
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.