Online
- Events
- Venues
- Online
Getting Started in Packet Decoding w/ Chris Brenton
OnlineOne of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.
Professionally Evil CISSP Mentorship Program
OnlineISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
Anti-Cast | Security Split: Divorcing Your Stack w/ Alissa Torres w/ Alissa Torres
OnlineSo your security team is convinced it needs to graduate to the newest "best" enterprise security tool, I get it. But for most, this type of architecture shift requires careful planning and implementation. For legacy tools, you probably made concessions during onboarding, accepted risks and grew product-specific dependencies. Join us for a free one-hour Antisyphon...
Read more... “Anti-Cast | Security Split: Divorcing Your Stack w/ Alissa Torres w/ Alissa Torres” »
Antisyphon Training @ BSides Fort Wayne 2024
OnlineAntisyphon Training will be at BSidesFortWayne this Fort Wayne, IN, this May!
Professionally Evil CISSP Mentorship Program
OnlineISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
Active Defense & Cyber Deception w/ John Strand
OnlineIn this class, you will learn how to force an attacker to take more moves to attack your network. These moves may increase your ability to detect them. You will learn how to gain better attribution as to who is attacking you and why. You will also find out how to get access to a bad guy’s system. And most importantly, you will find out how to do the above legally.
Anti-Cast | Threat Models, Landscape, and Profiles OH MY w/ Wade Wells
OnlineThis free one-hour Antisyphon Anti-Cast with instructor Wade Wells offers an insightful overview of cyber threat landscaping, threat modeling, and threat profiling.
SOC Core Skills w/ John Strand
OnlineThis 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have.
Professionally Evil Application Security (PEAS): Mastering Application Reconnaissance and Mapping
OnlineEmbark on a journey into the world of web security with Mastering Application Reconnaissance and Mapping. As part of the Professionally Evil Application Security series, this course focuses on the crucial aspects of reconnaissance and mapping within the application penetration testing methodology. Whether you're a seasoned professional or a curious newcomer, this course will equip you with the foundational knowledge and practical skills to assess web applications against potential vulnerabilities.
Professionally Evil Application Security (PEAS): Unveiling Server-Side Discovery and Exploitation
OnlineWelcome to the world of application security, where you'll unravel the hidden flaws lurking within server-side portions of web applications. Join us for the second course in the Professionally Evil Application Security series.
Professionally Evil Application Security (PEAS): Mastering Client-Side Flaws and Exploitation
OnlineEmbark on the finale of our Professionally Evil Application Security series with our course, Mastering Client-Side Flaws and Exploitation. In this session, you'll uncover the secrets of client-side vulnerabilities and learn how to secure web applications against potential threats.
Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
OnlineThis 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful.
Incident Response Summit
OnlineAre you prepared to handle a business email compromise? What about a large-scale breach? Confused about the processes and technologies you need to have in place to be successful? How about the personnel and their respective roles to execute various IR procedures?
Come join us at the Incident Response Summit and stay for the two-day training session. Learn how to get started on your journey!
Cyber Threat Intelligence 101 w/ Wade Wells
OnlineThe course provides a comprehensive overview of the CTI field and is perfect for anyone who wants to understand the importance of CTI and how it is used to protect organizations from cyber threats. By the end of the course, you will have a strong foundation in CTI and be able to contribute to an organization’s cyber security efforts.
Network Forensics and Incident Response w/ Troy Wojewoda
OnlineIncident responders are continually faced with the challenge of collecting and analyzing relevant event data—network communications is no exception. This course uses an assortment of network data acquisition tools and techniques with a focus on open-source, vendor-neutral solutions. Students who take this course will learn how to perform network traffic and protocol analysis that ultimately supports cybersecurity incident response efforts. From reconnaissance to data exfiltration, network traffic scales to provide a bird’s-eye view of attacker activity. Leveraging the vantage point of key network traffic chokepoints, this course explores nearly every phase of an attacker’s methodology. Students will learn network traffic analysis concepts and work through hands-on lab exercises that reinforce the course material using real-world attack scenarios.
Incident Response Foundations w/ Derek Banks
OnlineThe goal of this course is to provide the core components that make up a successful Incident Response program. Students will learn how to get started on their IR journey, what to prioritize, and why boring stuff like policies and procedures are just as important as technical digital forensics skills.
Linux Disk Forensics w/ Hal Pomeranz
OnlineThis 16-hour, hands-on course is a quick start into the world of Linux forensics. Learn how to use memory forensics to rapidly triage systems and spot attacker malware and rootkits. Learn where the most critical on-disk artifacts live and how they can help further an investigation. Rapidly process Linux logs and build a clearer picture of what happened on the system.
Professionally Evil API Testing: A Practical Course for Beginners
OnlineIf you want to learn how to perform security testing on web applications that use application programming interfaces (APIs), this course is for you. APIs are the connective tissue responsible for transferring information between systems, both internally and externally. They are also a common target for cyberattacks, as they can expose sensitive data, application logic, and internal infrastructure.
Professionally Evil API Testing: AAA and Keys are Not Just for Cars
OnlineThis course will teach you how to test web APIs for authorization and access control related security flaws. You will learn how to map API functionality, identify authentication and authorization flaws, and exploit common API vulnerabilities. You will also gain hands-on experience with tools and techniques for testing API authorization mechanisms and access control models. By the end of this course, you will be able to:
Professionally Evil API Testing: GraphQL, SOAP, and REST Fundamentals and Techniques
OnlineAre you interested in learning how to test different types of APIs for quality and security? Do you want to dive into the essential skills and techniques for testing GraphQL, SOAP, and REST APIs? If so, this course is for you! In this course, you will learn the fundamentals of API testing, including what APIs are, how they work, and why they are important. You will also learn the differences between GraphQL, SOAP, and REST APIs, and how they affect the way you test them for flaws and vulnerabilities. You will gain hands-on experience with various tools and frameworks for API testing, such as Postman, SoapUI, and GraphQL Playground. By the end of this course, you will be equipped to:
Active Defense & Cyber Deception w/ John Strand
OnlineIn this class, you will learn how to force an attacker to take more moves to attack your network. These moves may increase your ability to detect them. You will learn how to gain better attribution as to who is attacking you and why. You will also find out how to get access to a bad guy’s system. And most importantly, you will find out how to do the above legally.
Introduction to PCI (PCI 101) w/ Nathan Sweaney
OnlineThis course is designed to introduce IT professionals to the Payment Card Industry collection of standards as defined and enforced by the Payment Card Industry Security Standards Council. The first half of the course summarizes the structure and history of PCI, the primary standards documents, and the various certification programs for professionals. The second half of the course dives into a summary of the components of the PCI Data Security Standard (PCI DSS). This is a high-level, introductory summary designed to provide a general understanding of the requirements in the PCI DSS.
Enterprise Forensics and Response w/ Gerard Johansen
OnlineThe Enterprise Forensics and Response course is designed to provide students with both an investigative construct and techniques that allow them to scale incident response activities in an enterprise environment. The focus of the lecture portion of the course work is understanding the incident investigation process, objective oriented analysis and response, intrusion analysis and an exploration of attacker Tactics and Techniques.
Foundational Application Security Training (FAST) w/ Bill McCauley
OnlineThe Foundational Application Security Training (FAST) course is a 4-hour Pay What You Can
class focused on explaining the fundamentals of applications and their security. This
lecture-focused class is designed to allow managers, product owners, support staff and
non-developers to understand application security. This lecture includes what makes up the
various modern application technologies, the application development process, what
vulnerabilities and risks are exposed via applications and how the attacks happen.
SOC Core Skills w/ John Strand
OnlineThis 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have.
Getting Started in Packet Decoding w/ Chris Brenton
OnlineOne of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.
Professionally Evil CISSP Mentorship Program
OnlineISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
Professionally Evil CISSP Mentorship Program
OnlineISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
Professionally Evil CISSP Mentorship Program
OnlineISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
Professionally Evil CISSP Mentorship Program
OnlineISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
Linux Command-Line For Analysts and Operators w/ Hal Pomeranz
OnlineThis 16-hour, hands-on course is a quick start into the world of Linux forensics. Learn how to use memory forensics to rapidly triage systems and spot attacker malware and rootkits. Learn where the most critical on-disk artifacts live and how they can help further an investigation. Rapidly process Linux logs and build a clearer picture of what happened on the system.
This course is a quick jumpstart on the Linux command-line. Start from the basics and work all the way up to command-line programming. Short learning modules and lots of practical hands-on activities will put you on the road to Linux command-line mastery. And electronic copies of everything are yours to take home, so you can continue the learning even after class is over.
Incident Response Foundations w/ Derek Banks
OnlineThe goal of this course is to provide the core components that make up a successful Incident Response program. Students will learn how to get started on their IR journey, what to prioritize, and why boring stuff like policies and procedures are just as important as technical digital forensics skills.
Introduction to Python w/ Joff Thyer
OnlineThis course aims to teach the fundamentals of the Python programming language such that a student will gain a beginning to intermediate level of competency with the language. Labs will be presented in a Capture the Flag (CTF) style format as well as some more comprehensive programming tasks.
Network Forensics and Incident Response w/ Troy Wojewoda
OnlineIncident responders are continually faced with the challenge of collecting and analyzing relevant event data—network communications is no exception. This course uses an assortment of network data acquisition tools and techniques with a focus on open-source, vendor-neutral solutions. Students who take this course will learn how to perform network traffic and protocol analysis that ultimately supports cybersecurity incident response efforts. From reconnaissance to data exfiltration, network traffic scales to provide a bird’s-eye view of attacker activity. Leveraging the vantage point of key network traffic chokepoints, this course explores nearly every phase of an attacker’s methodology. Students will learn network traffic analysis concepts and work through hands-on lab exercises that reinforce the course material using real-world attack scenarios.
Advanced Offensive Tooling w/ Chris Traynor
OnlineIn the Advanced Offensive Tooling course, you will embark on a journey into the depths of cybersecurity expertise, immersing yourself in advanced techniques and methodologies employed byseasoned offensive operators. The curriculum is meticulously designed to not only sharpen your skills but also elevate your understanding of your toolset. Explore each tool's inner workings, unlock customization options, harness scripting abilities, and learn the art of responsible tool usage.
Introduction to Cybersecurity in Space Systems (ICSS): Hardware Edition w/ Tim Fowler
OnlineIntroduction to Cybersecurity in Space Systems is a course designed to expose cybersecurity professionals to the concepts and implementations of space systems including the ramification and impacts security can have on a mission.
Cyber Security Incident Command w/ Gerard Johansen
OnlineStudents will be guided through managing a cyber security incident through a combination of instructions and practical exercises that will leverage IR Tools and techniques. Specific focus will be on specific decisions and actions that take place during an incident, how to coordinate strategic, operational, and technical teams, addressing crisis communications and getting the organization back to normal.
Next Level OSINT w/ Mishaal Khan
OnlineThe course progresses from basic to very advanced practical OSINT techniques that you can use in your investigative routine. No special software, operating system, or paid licenses are required. Bookmarks for all tools and websites used will be provided for quick access.
Professionally Evil CISSP Mentorship Program
OnlineISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
Professionally Evil CISSP Mentorship Program
OnlineISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
Professionally Evil CISSP Mentorship Program
OnlineISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
Professionally Evil CISSP Mentorship Program
OnlineISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
Professionally Evil CISSP Mentorship Program
OnlineISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
Professionally Evil CISSP Mentorship Program
OnlineISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
Professionally Evil CISSP Mentorship Program
OnlineISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.