HackerOps w/ Ralph May
To conduct an advanced attack, you need more than just a collection of simple scripts. In addition to talent, you need a large amount of managed and unmanaged code. The […]
To conduct an advanced attack, you need more than just a collection of simple scripts. In addition to talent, you need a large amount of managed and unmanaged code. The […]
Register: https://www.antisyphontraining.com/linux-command-line-dojo-w-hal-pomeranz/ The DevOps folks are pushing Linux, your red-team friends are doing serious damage with Linux-based tools, and the Linux users on your Incident Response team are doing mysteriously […]
Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ Are you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? […]
Register: https://www.antisyphontraining.com/advanced-network-threat-hunting-w-chris-brenton/ So far we’ve had over 21,000 students attend our one-day network threat hunting course. Many have asked that we provide an extended class with more hands-on lab time. That is […]
Register: https://www.antisyphontraining.com/breaching-the-cloud-w-beau-bullock/ Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web […]
Register: https://www.antisyphontraining.com/enterprise-attack-initial-access-w-steve-borosh/ Enterprises have been working tirelessly to improve their security postures through defense-in-depth approaches. Offensive teams have also been putting in long hours of research into bypassing the latest […]
Register: https://www.antisyphontraining.com/offensive-development-w-greg-hatcher-john-stigerwalt/ Dive deep into cutting edge techniques that bypass or neuter modern endpoint defenses. Learn how these solutions work to mitigate their utility and hide deep within code on […]
Register: https://www.antisyphontraining.com/modern-webapp-pentesting-w-bb-king/ Modern Webapp Pentesting is unique in its approach to testing webapps. Too many courses are built around the assumption that a webapp pentester’s skills should grow along a straight […]
Register: https://www.antisyphontraining.com/network-forensics-and-detection-w-troy-wojewoda/ Incident responders are continually faced with the challenge of collecting and analyzing relevant event data—network communications is no exception. This course uses an assortment of network data acquisition […]
Register: https://www.antisyphontraining.com/incident-response-foundations-w-derek-banks/ Are you just getting started with Incident Response (IR) and not sure where to begin? Do you need to stand up an IR program or establish a Computer […]
Register: https://www.antisyphontraining.com/red-team-fundamentals-for-active-directory/ The Red Team Fundamentals for Active Directory course is an 8-hour class focused on explaining the fundamentals of Active Directory and how different aspects can be exploited when […]
Register: https://www.antisyphontraining.com/introduction-to-pentesting/ Are you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements, operational phases, […]
For most security teams, high operational tempo (measured in dumpster fire lumens) incentivizes analysts to stick to well-tailored playbooks that prioritize remediation at the expense of proper incident scoping and […]
Register: https://www.antisyphontraining.com/intro-to-offensive-tooling-w-chris-traynor/ Information security is an increasingly important field, as the amount of data being transmitted and stored digitally continues to grow. In order to protect this data from unauthorized […]
Register: https://www.antisyphontraining.com/introduction-to-python/ One of the most pressing needs Information Security professionals face today is the need to automate their work in both the attack, and defense context. Skills gained for […]
Register: https://www.antisyphontraining.com/powershell-for-infosec-what-you-need-to-know/ PowerShell is an excellent cross-platform shell for executing commands and scripts on both local and remote machines. It is installed on Windows by default and is widely used […]
Register: https://www.antisyphontraining.com/professionally-evil-api-testing/ This workshop-style intermediate course is designed to complement a student’s understanding of traditional Web Application Security. It focuses on modern application and API security features and tactics to […]
Register: https://www.antisyphontraining.com/securing-the-cloud-foundations-w-andrew-krug/ In this course, we’ll explore Amazon Web Services (AWS) as a platform. We will take the perspective of a new startup company spinning up infrastructure in AWS for […]
Register: https://www.antisyphontraining.com/securing-the-cloud-foundations-w-andrew-krug/ In this course, we’ll explore Amazon Web Services (AWS) as a platform. We will take the perspective of a new startup company spinning up infrastructure in AWS for […]
Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ Active Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. […]