Calendar of Events
S Sun
M Mon
T Tue
W Wed
T Thu
F Fri
S Sat
0 events,
0 events,
1 event,
Introduction to Industrial Control Systems
Introduction to Industrial Control Systems
Introduction to Industrial Control Systems provides intensive training on defending and attacking industrial control systems. The course will discuss common vulnerabilities, attack paths, defending industrial control systems, and architecture of industrial control environments. This course will provide hands-on training in a lab setting while attacking and securing a virtual factory.
2 events,
Anti-Cast | Exploring PowerShell Logging with TellTail
Anti-Cast | Exploring PowerShell Logging with TellTail
TellTail is a free and open-source application that makes it easy to view and learn about PowerShell logging. In this webcast, we will enable/disable the various PowerShell logging options and watch the effect it has on what gets logged. Come to this webcast to learn more about PowerShell Script Block and Module logging and how you can easily explore and learn on your own.
Introduction to Industrial Control Systems
Introduction to Industrial Control Systems
Introduction to Industrial Control Systems provides intensive training on defending and attacking industrial control systems. The course will discuss common vulnerabilities, attack paths, defending industrial control systems, and architecture of industrial control environments. This course will provide hands-on training in a lab setting while attacking and securing a virtual factory.
1 event,
Introduction to Industrial Control Systems
Introduction to Industrial Control Systems
Introduction to Industrial Control Systems provides intensive training on defending and attacking industrial control systems. The course will discuss common vulnerabilities, attack paths, defending industrial control systems, and architecture of industrial control environments. This course will provide hands-on training in a lab setting while attacking and securing a virtual factory.
1 event,
Introduction to Industrial Control Systems
Introduction to Industrial Control Systems
Introduction to Industrial Control Systems provides intensive training on defending and attacking industrial control systems. The course will discuss common vulnerabilities, attack paths, defending industrial control systems, and architecture of industrial control environments. This course will provide hands-on training in a lab setting while attacking and securing a virtual factory.
0 events,
0 events,
0 events,
0 events,
2 events,
Anti-Cast | The Wrong Beer to the Barbecue: BYOVD Attacks (BYOVD: Bring Your Own Vulnerable Driver)
Anti-Cast | The Wrong Beer to the Barbecue: BYOVD Attacks (BYOVD: Bring Your Own Vulnerable Driver)
Based on recent threat reports, a growing number of bad actors are bringing vulnerable drivers to victim environments to exploit and guarantee a more successful attack path. These kernel drivers are legitimate, trusted and... vulnerable! Amazingly, some have CVEs dating back to 2015 or earlier. During this Anti-Cast, we will map out detection methods to identify and remove vulnerable drivers already present in your network AND devise prevent/block strategies to future-proof against BYOVD attacks.
Professionally Evil Application Security (PEAS): Mastering Application Reconnaissance and Mapping
Professionally Evil Application Security (PEAS): Mastering Application Reconnaissance and Mapping
Embark on a journey into the world of web security with Mastering Application Reconnaissance and Mapping. As part of the Professionally Evil Application Security series, this course focuses on the crucial aspects of reconnaissance and mapping within the application penetration testing methodology. Whether you're a seasoned professional or a curious newcomer, this course will equip you with the foundational knowledge and practical skills to assess web applications against potential vulnerabilities.
0 events,
0 events,
0 events,
0 events,
0 events,
3 events,
Linux Forensics
Linux Forensics
One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.
Professionally Evil API Testing: A Practical Course for Beginners
Professionally Evil API Testing: A Practical Course for Beginners
If you want to learn how to perform security testing on web applications that use application programming interfaces (APIs), this course is for you. APIs are the connective tissue responsible for transferring information between systems, both internally and externally. They are also a common target for cyberattacks, as they can expose sensitive data, application logic, and internal infrastructure.
Professionally Evil CISSP Mentorship Program
Professionally Evil CISSP Mentorship Program
ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
3 events,
Linux Forensics
Linux Forensics
One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.
Professionally Evil Container Security (PECSEC) – Out of the Box: Strategies for Escaping from Containers
Professionally Evil Container Security (PECSEC) – Out of the Box: Strategies for Escaping from Containers
This immersive training course invites participants to delve into the world of container technologies and learn about container escape techniques. Often, container environments are seen as safe spaces; this course, however, challenges that perspective by demonstrating ways in which these seemingly secure environments can be compromised. Through a series of interactive exercises and real-world examples, participants will learn how to identify weaknesses in container configurations and how to escape from containerized environments. This course is ideal for anyone involved with container technologies, keen to enhance their security skills.
Anti-Cast | Credential Compartmentalization in Active Directory
Anti-Cast | Credential Compartmentalization in Active Directory
When it comes to security, the goal is to make an attacker’s job as difficult as possible. The more hurdles they must jump through, the easier it should be to detect and stop them. Unfortunately, common practices around how and where privileged accounts are used in Windows environments reduces the race down to only a couple of jumps (or maybe just a sprint). We will talk about why device and account tiering is critically important for making a network a virtual obstacle course.
1 event,
Linux Forensics
Linux Forensics
One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.
1 event,
Linux Forensics
Linux Forensics
One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.
0 events,
0 events,
1 event,
Getting Started in Security with BHIS and MITRE ATT&CK
Getting Started in Security with BHIS and MITRE ATT&CK
This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful.
2 events,
Getting Started in Security with BHIS and MITRE ATT&CK
Getting Started in Security with BHIS and MITRE ATT&CK
This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful.
Professionally Evil CISSP Mentorship Program
Professionally Evil CISSP Mentorship Program
ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
2 events,
Getting Started in Security with BHIS and MITRE ATT&CK
Getting Started in Security with BHIS and MITRE ATT&CK
This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful.
Anti-Cast | API-ocalypse Now
Anti-Cast | API-ocalypse Now
Get ready for a wild ride as Jennifer Shannon, a Senior Security Consultant at Secure Ideas, presents "API-ocalypse Now." In this thrilling and entertaining webcast, Jennifer will showcase the vulnerabilities lurking within APIs and the havoc they can wreak if left unaddressed. Through live pentesting demos, she will demonstrate jaw-dropping exploits, mind-bending injection attacks, and authentication bypass techniques that will leave you on the edge of your seat. Join Jennifer as she navigates the dark side of APIs to help you understand and fortify your attack surface in order to prevent the impending API-ocalypse.
1 event,
Getting Started in Security with BHIS and MITRE ATT&CK
Getting Started in Security with BHIS and MITRE ATT&CK
This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful.
0 events,
0 events,
0 events,
0 events,
2 events,
Red Team Fundamentals for Active Directory
Red Team Fundamentals for Active Directory
Red Team Fundamentals for Active Directory course is an 8-hour class focused on explaining the fundamentals of Active Directory and how different aspects can be exploited when performing penetration tests.
Professionally Evil CISSP Mentorship Program
Professionally Evil CISSP Mentorship Program
ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
2 events,
Red Team Fundamentals for Active Directory
Red Team Fundamentals for Active Directory
Red Team Fundamentals for Active Directory course is an 8-hour class focused on explaining the fundamentals of Active Directory and how different aspects can be exploited when performing penetration tests.
Anti-Cast | Infiltrating Kubernetes: Attacker Motives and Methods
Anti-Cast | Infiltrating Kubernetes: Attacker Motives and Methods
In this one-hour webinar, we will explore an overview of the threats targeting Kubernetes, a crucial technology for managing containerized applications. “Infiltrating Kubernetes: An Overview of Attacker Motives and Methods,” aims to equip IT professionals, DevOps engineers, and cybersecurity enthusiasts with insights into why and how attackers infiltrate Kubernetes environments.
0 events,
0 events,
0 events,
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.