Attack Emulation Tools: Atomic Red Team, CALDERA and More

Virtual

Attack Emulation tools help you measure, monitor and improve your security controls by executing scripted attacks. Atomic Red Team and CALDERA are two open source attack emulation projects that are mapped directly to the MITRE ATT&CK Framework. This class will provide an overview of the MITRE ATT&CK framework and give you in-depth, hands-on knowledge of...

$495

Getting Started with Packet Decoding

Virtual

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when...

$25 – $495

Regular Expressions, Your New Lifestyle

Virtual

Regular expressions are universally embedded in the world of information technology. They are a part of many programming languages, databases, search engines, and command-line tools. As an information security professional, you are continuously analyzing textual data for indicators of compromise, juicy data morsels to exfiltrate, forensic artifacts, supporting evidence in threat hunting, and so much...

$25 – $125

Getting Started in Security with BHIS and MITRE ATT&CK

Virtual

This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. At Black Hills Information Security we conduct over 500 security assessments per...

$25 – $495

HackerOps

Virtual

To conduct an advanced attack, you need more than just a collection of simple scripts. In addition to talent, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement, the more time we need. Time is something we don’t have a lot of...

$495

Advanced Endpoint Investigations

Virtual

For most security teams, high operational tempo (measured in dumpster fire lumens) incentivizes analysts to stick to well-tailored playbooks that prioritize remediation at the expense of proper incident scoping and root cause analysis. Though modern endpoint security products have significantly improved host visibility, most critical incidents will require the acquisition and analysis of additional endpoint...

$495

Securing the Cloud: Foundations

Virtual

In this course, we’ll explore Amazon Web Services (AWS) as a platform. We will take the perspective of a new startup company spinning up infrastructure in AWS for the very first time. We’ll use a scenario-based approach, where you’ll don the persona of a security engineer on your first day at a new startup. This course will...

$495

Enterprise Attacker Emulation and C2 Implant Development

Virtual

As penetration testers, we all have a need to establish command and control channels in our customer environments. This can be done under the guise of an “assumed compromise” context or in a more adversarial Red Team context. The age of endpoint detection and response (EDR) solutions and application whitelisting has created significant barriers to...

$495

Network Forensics and Detection

Virtual

Incident responders are continually faced with the challenge of collecting and analyzing relevant event data—network communications is no exception. This course uses an assortment of network data acquisition tools and techniques with a focus on open-source, vendor-neutral solutions. Students who take this course will learn how to perform network traffic and protocol analysis that ultimately...

$495

Password Cracking 101 + 1

Virtual

You’ve ransacked the domain and cracked some of the hashes, but some privileged account passwords still elude you. Or maybe you’ve compromised an application and found the password hashes in the database, but your dictionaries are failing you. Don’t worry, we’ve got you covered! During this intensive one-day training, you’ll get hands-on experience of a...

$25 – $125

Getting Started with Packet Decoding

Virtual

One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when...

$25 – $495