Skip to content
Antisyphon Training

Antisyphon Training

  • Home
  • News & Updates
  • Calendar
  • Training
    • Course Catalog
    • Live Training
      • Live Courses Catalog
      • Live Training Calendar
    • On-Demand Training
      • On-Demand Catalog
      • Security for MSPs
    • Pay What You Can Training
    • Cybersecurity Training for Businesses
    • The Vault Program
    • Training Roadmap
  • Summits
    • Upcoming Summits
    • Past Summits
  • Cyber Range
    • About Our Cyber Range
    • ACE-T™ Certification
    • Purchase Subscription
  • About
    • Mission
    • FAQ
    • Our Instructors
    • Giving Back
    • Testimonials
  • Contact Us
  • Toggle search form
Loading view.

Events Search and Views Navigation

Event Views Navigation

  • List
  • Month
  • Day
  • Summary
This Month

Filters

Changing any of the form inputs will cause the list of events to refresh with the filtered results.

Event Category
Cost ($)
Tags
Venues
Day
Time

Calendar of Events

S Sun

M Mon

T Tue

W Wed

T Thu

F Fri

S Sat

0 events, 27

0 events, 28

1 event, 29

11:00 am - 4:00 pm Event Series

Introduction to Industrial Control Systems

Introduction to Industrial Control Systems with Ashley Van Hoesen
August 29 @ 11:00 am - 4:00 pm EDT Event Series

Introduction to Industrial Control Systems

Introduction to Industrial Control Systems provides intensive training on defending and attacking industrial control systems. The course will discuss common vulnerabilities, attack paths, defending industrial control systems, and architecture of industrial control environments. This course will provide hands-on training in a lab setting while attacking and securing a virtual factory.

$575

2 events, 30

12:00 pm - 1:00 pm

Anti-Cast | Exploring PowerShell Logging with TellTail

Anti-Cast | Exploring PowerShell Logging with TellTail w/ Carrie Roberts
August 30 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | Exploring PowerShell Logging with TellTail

TellTail is a free and open-source application that makes it easy to view and learn about PowerShell logging. In this webcast, we will enable/disable the various PowerShell logging options and watch the effect it has on what gets logged. Come to this webcast to learn more about PowerShell Script Block and Module logging and how you can easily explore and learn on your own.

Free
12:00 pm - 4:00 pm Event Series

Introduction to Industrial Control Systems

Introduction to Industrial Control Systems with Ashley Van Hoesen
August 30 @ 12:00 pm - 4:00 pm EDT Event Series

Introduction to Industrial Control Systems

Introduction to Industrial Control Systems provides intensive training on defending and attacking industrial control systems. The course will discuss common vulnerabilities, attack paths, defending industrial control systems, and architecture of industrial control environments. This course will provide hands-on training in a lab setting while attacking and securing a virtual factory.

$575

1 event, 31

12:00 pm - 4:00 pm Event Series

Introduction to Industrial Control Systems

Introduction to Industrial Control Systems with Ashley Van Hoesen
August 31 @ 12:00 pm - 4:00 pm EDT Event Series

Introduction to Industrial Control Systems

Introduction to Industrial Control Systems provides intensive training on defending and attacking industrial control systems. The course will discuss common vulnerabilities, attack paths, defending industrial control systems, and architecture of industrial control environments. This course will provide hands-on training in a lab setting while attacking and securing a virtual factory.

$575

1 event, 1

12:00 pm - 4:00 pm Event Series

Introduction to Industrial Control Systems

Introduction to Industrial Control Systems with Ashley Van Hoesen
September 1 @ 12:00 pm - 4:00 pm EDT Event Series

Introduction to Industrial Control Systems

Introduction to Industrial Control Systems provides intensive training on defending and attacking industrial control systems. The course will discuss common vulnerabilities, attack paths, defending industrial control systems, and architecture of industrial control environments. This course will provide hands-on training in a lab setting while attacking and securing a virtual factory.

$575

0 events, 2

0 events, 3

0 events, 4

0 events, 5

2 events, 6

12:00 pm - 1:00 pm

Anti-Cast | The Wrong Beer to the Barbecue: BYOVD Attacks (BYOVD: Bring Your Own Vulnerable Driver)

Anti-Cast | The Wrong Beer to the Barbecue w/ Alissa Torres
September 6 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | The Wrong Beer to the Barbecue: BYOVD Attacks (BYOVD: Bring Your Own Vulnerable Driver)

Based on recent threat reports, a growing number of bad actors are bringing vulnerable drivers to victim environments to exploit and guarantee a more successful attack path. These kernel drivers are legitimate, trusted and... vulnerable! Amazingly, some have CVEs dating back to 2015 or earlier. During this Anti-Cast, we will map out detection methods to identify and remove vulnerable drivers already present in your network AND devise prevent/block strategies to future-proof against BYOVD attacks.

Free
12:00 pm - 4:00 pm Event Series

Professionally Evil Application Security (PEAS): Mastering Application Reconnaissance and Mapping

Professionally Evil Application Security (PEAS): Mastering Application Reconnaissance and Mapping
September 6 @ 12:00 pm - 4:00 pm EDT Event Series

Professionally Evil Application Security (PEAS): Mastering Application Reconnaissance and Mapping

Embark on a journey into the world of web security with Mastering Application Reconnaissance and Mapping. As part of the Professionally Evil Application Security series, this course focuses on the crucial aspects of reconnaissance and mapping within the application penetration testing methodology.  Whether you're a seasoned professional or a curious newcomer, this course will equip you with the foundational knowledge and practical skills to assess web applications against potential vulnerabilities. 

$25 – $150

0 events, 7

0 events, 8

0 events, 9

0 events, 10

0 events, 11

3 events, 12

9:00 am - 5:00 pm Event Series

Linux Forensics

Linux Forensics with Hal Pomeranz
September 12 @ 9:00 am - 5:00 pm EDT Event Series

Linux Forensics

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.

$1095
11:00 am - 3:00 pm Event Series

Professionally Evil API Testing: A Practical Course for Beginners

Professionally Evil API Testing: A Practical Course for Beginners
September 12 @ 11:00 am - 3:00 pm EDT Event Series

Professionally Evil API Testing: A Practical Course for Beginners

If you want to learn how to perform security testing on web applications that use application programming interfaces (APIs), this course is for you. APIs are the connective tissue responsible for transferring information between systems, both internally and externally. They are also a common target for cyberattacks, as they can expose sensitive data, application logic, and internal infrastructure.

$25 – $150
2:00 pm - 4:00 pm Event Series

Professionally Evil CISSP Mentorship Program

Secure Ideas - Professionally Evil CISSP Mentorship
September 12 @ 2:00 pm - 4:00 pm EDT Event Series

Professionally Evil CISSP Mentorship Program

ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.

$100 – $1000

3 events, 13

9:00 am - 5:00 pm Event Series

Linux Forensics

Linux Forensics with Hal Pomeranz
September 13 @ 9:00 am - 5:00 pm EDT Event Series

Linux Forensics

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.

$1095
12:00 pm - 4:00 pm Event Series

Professionally Evil Container Security (PECSEC) – Out of the Box: Strategies for Escaping from Containers

Professionally Evil Container Security (PECSEC) - Out of the Box: Strategies for Escaping from Containers w/ Cory Sabol
September 13 @ 12:00 pm - 4:00 pm EDT Event Series

Professionally Evil Container Security (PECSEC) – Out of the Box: Strategies for Escaping from Containers

This immersive training course invites participants to delve into the world of container technologies and learn about container escape techniques. Often, container environments are seen as safe spaces; this course, however, challenges that perspective by demonstrating ways in which these seemingly secure environments can be compromised. Through a series of interactive exercises and real-world examples, participants will learn how to identify weaknesses in container configurations and how to escape from containerized environments. This course is ideal for anyone involved with container technologies, keen to enhance their security skills.

$25 – $150
12:00 pm - 1:00 pm

Anti-Cast | Credential Compartmentalization in Active Directory

Anti-Cast | Credential Compartmentalization in Active Director w/ Eric Kuehn
September 13 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | Credential Compartmentalization in Active Directory

When it comes to security, the goal is to make an attacker’s job as difficult as possible. The more hurdles they must jump through, the easier it should be to detect and stop them. Unfortunately, common practices around how and where privileged accounts are used in Windows environments reduces the race down to only a couple of jumps (or maybe just a sprint). We will talk about why device and account tiering is critically important for making a network a virtual obstacle course.

Free

1 event, 14

9:00 am - 5:00 pm Event Series

Linux Forensics

Linux Forensics with Hal Pomeranz
September 14 @ 9:00 am - 5:00 pm EDT Event Series

Linux Forensics

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.

$1095

1 event, 15

9:00 am - 5:00 pm Event Series

Linux Forensics

Linux Forensics with Hal Pomeranz
September 15 @ 9:00 am - 5:00 pm EDT Event Series

Linux Forensics

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.

$1095

0 events, 16

0 events, 17

1 event, 18

11:00 am - 4:00 pm Event Series

Getting Started in Security with BHIS and MITRE ATT&CK

Getting Started in Security with BHIS and MITRE ATT&CK with John Strand
September 18 @ 11:00 am - 4:00 pm EDT Event Series

Getting Started in Security with BHIS and MITRE ATT&CK

This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful.

$575

2 events, 19

12:00 pm - 4:00 pm Event Series

Getting Started in Security with BHIS and MITRE ATT&CK

Getting Started in Security with BHIS and MITRE ATT&CK with John Strand
September 19 @ 12:00 pm - 4:00 pm EDT Event Series

Getting Started in Security with BHIS and MITRE ATT&CK

This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful.

$575
2:00 pm - 4:00 pm Event Series

Professionally Evil CISSP Mentorship Program

Secure Ideas - Professionally Evil CISSP Mentorship
September 19 @ 2:00 pm - 4:00 pm EDT Event Series

Professionally Evil CISSP Mentorship Program

ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.

$100 – $1000

2 events, 20

12:00 pm - 4:00 pm Event Series

Getting Started in Security with BHIS and MITRE ATT&CK

Getting Started in Security with BHIS and MITRE ATT&CK with John Strand
September 20 @ 12:00 pm - 4:00 pm EDT Event Series

Getting Started in Security with BHIS and MITRE ATT&CK

This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful.

$575
12:00 pm - 1:00 pm

Anti-Cast | API-ocalypse Now

Anti-Cast | API-ocalypse Now w/ Jennifer Shannon
September 20 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | API-ocalypse Now

Get ready for a wild ride as Jennifer Shannon, a Senior Security Consultant at Secure Ideas, presents "API-ocalypse Now." In this thrilling and entertaining webcast, Jennifer will showcase the vulnerabilities lurking within APIs and the havoc they can wreak if left unaddressed. Through live pentesting demos, she will demonstrate jaw-dropping exploits, mind-bending injection attacks, and authentication bypass techniques that will leave you on the edge of your seat. Join Jennifer as she navigates the dark side of APIs to help you understand and fortify your attack surface in order to prevent the impending API-ocalypse.

Free

1 event, 21

12:00 pm - 4:00 pm Event Series

Getting Started in Security with BHIS and MITRE ATT&CK

Getting Started in Security with BHIS and MITRE ATT&CK with John Strand
September 21 @ 12:00 pm - 4:00 pm EDT Event Series

Getting Started in Security with BHIS and MITRE ATT&CK

This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful.

$575

0 events, 22

0 events, 23

0 events, 24

0 events, 25

2 events, 26

11:00 am - 4:00 pm Event Series

Red Team Fundamentals for Active Directory

Secure Ideas - Red Team Fundamentals for Active Directory
September 26 @ 11:00 am - 4:00 pm EDT Event Series

Red Team Fundamentals for Active Directory

Red Team Fundamentals for Active Directory course is an 8-hour class focused on explaining the fundamentals of Active Directory and how different aspects can be exploited when performing penetration tests.

$295
2:00 pm - 4:00 pm Event Series

Professionally Evil CISSP Mentorship Program

Secure Ideas - Professionally Evil CISSP Mentorship
September 26 @ 2:00 pm - 4:00 pm EDT Event Series

Professionally Evil CISSP Mentorship Program

ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.

$100 – $1000

2 events, 27

12:00 pm - 4:00 pm Event Series

Red Team Fundamentals for Active Directory

Secure Ideas - Red Team Fundamentals for Active Directory
September 27 @ 12:00 pm - 4:00 pm EDT Event Series

Red Team Fundamentals for Active Directory

Red Team Fundamentals for Active Directory course is an 8-hour class focused on explaining the fundamentals of Active Directory and how different aspects can be exploited when performing penetration tests.

$295
12:00 pm - 1:00 pm

Anti-Cast | Infiltrating Kubernetes: Attacker Motives and Methods

Anti-Cast | Infiltrating Kubernetes: Attacker Motives and Methods w/ Cory Sabol
September 27 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | Infiltrating Kubernetes: Attacker Motives and Methods

In this one-hour webinar, we will explore an overview of the threats targeting Kubernetes, a crucial technology for managing containerized applications. “Infiltrating Kubernetes: An Overview of Attacker Motives and Methods,” aims to equip IT professionals, DevOps engineers, and cybersecurity enthusiasts with insights into why and how attackers infiltrate Kubernetes environments. 

Free

0 events, 28

0 events, 29

0 events, 30

  • There are no events on this day.
  • There are no events on this day.
August 29
August 29 @ 11:00 am - 4:00 pm EDT Event Series

Introduction to Industrial Control Systems

August 30
August 30 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | Exploring PowerShell Logging with TellTail

August 30 @ 12:00 pm - 4:00 pm EDT Event Series

Introduction to Industrial Control Systems

August 31
August 31 @ 12:00 pm - 4:00 pm EDT Event Series

Introduction to Industrial Control Systems

September 1
September 1 @ 12:00 pm - 4:00 pm EDT Event Series

Introduction to Industrial Control Systems

  • There are no events on this day.
  • There are no events on this day.
  • There are no events on this day.
  • There are no events on this day.
September 6
September 6 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | The Wrong Beer to the Barbecue: BYOVD Attacks (BYOVD: Bring Your Own Vulnerable Driver)

September 6 @ 12:00 pm - 4:00 pm EDT Event Series

Professionally Evil Application Security (PEAS): Mastering Application Reconnaissance and Mapping

  • There are no events on this day.
  • There are no events on this day.
  • There are no events on this day.
  • There are no events on this day.
  • There are no events on this day.
September 12
September 12 @ 9:00 am - 5:00 pm EDT Event Series

Linux Forensics

September 12 @ 11:00 am - 3:00 pm EDT Event Series

Professionally Evil API Testing: A Practical Course for Beginners

September 12 @ 2:00 pm - 4:00 pm EDT Event Series

Professionally Evil CISSP Mentorship Program

September 13
September 13 @ 9:00 am - 5:00 pm EDT Event Series

Linux Forensics

September 13 @ 12:00 pm - 4:00 pm EDT Event Series

Professionally Evil Container Security (PECSEC) – Out of the Box: Strategies for Escaping from Containers

September 13 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | Credential Compartmentalization in Active Directory

September 14
September 14 @ 9:00 am - 5:00 pm EDT Event Series

Linux Forensics

September 15
September 15 @ 9:00 am - 5:00 pm EDT Event Series

Linux Forensics

  • There are no events on this day.
  • There are no events on this day.
September 18
September 18 @ 11:00 am - 4:00 pm EDT Event Series

Getting Started in Security with BHIS and MITRE ATT&CK

September 19
September 19 @ 12:00 pm - 4:00 pm EDT Event Series

Getting Started in Security with BHIS and MITRE ATT&CK

September 19 @ 2:00 pm - 4:00 pm EDT Event Series

Professionally Evil CISSP Mentorship Program

September 20
September 20 @ 12:00 pm - 4:00 pm EDT Event Series

Getting Started in Security with BHIS and MITRE ATT&CK

September 20 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | API-ocalypse Now

September 21
September 21 @ 12:00 pm - 4:00 pm EDT Event Series

Getting Started in Security with BHIS and MITRE ATT&CK

  • There are no events on this day.
  • There are no events on this day.
  • There are no events on this day.
  • There are no events on this day.
September 26
September 26 @ 11:00 am - 4:00 pm EDT Event Series

Red Team Fundamentals for Active Directory

September 26 @ 2:00 pm - 4:00 pm EDT Event Series

Professionally Evil CISSP Mentorship Program

September 27
September 27 @ 12:00 pm - 4:00 pm EDT Event Series

Red Team Fundamentals for Active Directory

September 27 @ 12:00 pm - 1:00 pm EDT

Anti-Cast | Infiltrating Kubernetes: Attacker Motives and Methods

  • There are no events on this day.
  • There are no events on this day.
  • There are no events on this day.
  • Aug
  • This Month
  • Oct
  • Google Calendar
  • iCalendar
  • Outlook 365
  • Outlook Live
  • Export .ics file
  • Export Outlook .ics file
Join the Antisyphon Training Discord Server!
  • Twitter
  • LinkedIn
  • Mastodon
PROMPT#

Copyright © 2023 Antisyphon

Powered by PressBook Dark WordPress theme