Antisyphon
- Events
- Antisyphon
Antisyphon Training @ BSides Fort Wayne 2024
OnlineAntisyphon Training will be at BSidesFortWayne this Fort Wayne, IN, this May!
Modern Webapp Pentesting II: Webapp Internals w/ BB King
Skyline/Ash Brokerage Building 888 S. Harrison St. #500, Fort Wayne, IN, United StatesModern Webapp Pentesting II: Webapp Internals is written as a followup to Modern Webapp Pentesting. This course builds on the fundamentals and gives you experience with how they apply to current problems in web applications.
Hacking Active Directory: Fundamentals and Techniques w/ Dale Hobbs
Skyline/Ash Brokerage Building 888 S. Harrison St. #500, Fort Wayne, IN, United StatesThe majority of enterprise networks today are managed using Microsoft Active Directory and it is crucial for a security professional to understand the current threats to a modern Windows environment.
The course begins with an overview of Active Directory architecture and how it can be leveraged by attackers to gain access to critical assets. Participants will learn about the various attack vectors and methods used to compromise Active Directory, such as password attacks, service abuse and privilege escalation.
Cyber Threat Intelligence 101 w/ Wade Wells
OnlineThe course provides a comprehensive overview of the CTI field and is perfect for anyone who wants to understand the importance of CTI and how it is used to protect organizations from cyber threats. By the end of the course, you will have a strong foundation in CTI and be able to contribute to an organization’s cyber security efforts.
Breaching the Cloud w/ Beau Bullock
This training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization.
Practical Physical Exploitation w/ Ralph May and Travis Weathers
Tampa, FL Tampa, Florida, United StatesThe Practical Physical Exploitation Course is designed to provide you with everything needed to sell and execute physical security assessments. The key word here is PRACTICAL; everything covered in this course is what you need to know to be successful on your first solo assessment.
Enterprise Forensics and Response w/ Gerard Johansen
OnlineThe Enterprise Forensics and Response course is designed to provide students with both an investigative construct and techniques that allow them to scale incident response activities in an enterprise environment. The focus of the lecture portion of the course work is understanding the incident investigation process, objective oriented analysis and response, intrusion analysis and an exploration of attacker Tactics and Techniques.
Defending the Enterprise w/ Kent Ickler and Jordan Drysdale
For the luckiest of enterprises, the awareness of an insecure environment is proven not in public discord after a breach but instead by effective security penetration tests. Time and time again Jordan and Kent have witnessed organizations struggle with network management, Active Directory, organizational change, and an increasingly experienced adversary.
Ransomware Attack Simulation and Investigation for Blue Teamers w/ Markus Schober
As a cyber security defender and investigator, we often just get to analyze an environment that suffered a ransomware attack after the ransomware execution, where we are trying to make our way back in time to understand the scope and initial infection vectors of a breach. However, knowing how attackers operate and having an understanding of their tools can help tremendously to conduct a more effective analysis and response and ultimately lower the impact of such attacks. This is why in this workshop we will teach you how to perform the common steps of every phase in a ransomware attack scenario as the attacker, from initial infection to impact.
Advanced Offensive Tooling w/ Chris Traynor
OnlineIn the Advanced Offensive Tooling course, you will embark on a journey into the depths of cybersecurity expertise, immersing yourself in advanced techniques and methodologies employed byseasoned offensive operators. The curriculum is meticulously designed to not only sharpen your skills but also elevate your understanding of your toolset. Explore each tool's inner workings, unlock customization options, harness scripting abilities, and learn the art of responsible tool usage.
Breaching the Cloud w/ Beau Bullock
This training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization.
Hacking Active Directory: Fundamentals and Techniques w/ Dale Hobbs
The majority of enterprise networks today are managed using Microsoft Active Directory and it is crucial for a security professional to understand the current threats to a modern Windows environment.
The course begins with an overview of Active Directory architecture and how it can be leveraged by attackers to gain access to critical assets. Participants will learn about the various attack vectors and methods used to compromise Active Directory, such as password attacks, service abuse and privilege escalation.
Practical Physical Exploitation w/ Ralph May and Travis Weathers
Tampa, FL Tampa, Florida, United StatesThe Practical Physical Exploitation Course is designed to provide you with everything needed to sell and execute physical security assessments. The key word here is PRACTICAL; everything covered in this course is what you need to know to be successful on your first solo assessment.