Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. At Black Hills Information Security we conduct over 500 security […]
Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. At Black Hills Information Security we conduct over 500 security […]
Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. At Black Hills Information Security we conduct over 500 security […]
Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. At Black Hills Information Security we conduct over 500 security […]
Register: https://www.antisyphontraining.com/professionally-evil-container-security This course is designed to cover the core fundamentals of container and container orchestration security. We’ll explore container security concerns, configuration issues, and how to abuse them as an attacker. Then we’ll switch gears and explore the ways that we can prevent the attacks we just carried out. This will all be done […]
Register: https://www.antisyphontraining.com/professionally-evil-container-security This course is designed to cover the core fundamentals of container and container orchestration security. We’ll explore container security concerns, configuration issues, and how to abuse them as an attacker. Then we’ll switch gears and explore the ways that we can prevent the attacks we just carried out. This will all be done […]
In this free one-hour Black Hills Information Security (BHIS) webcast I'll share my favorite ways of making an attacker's day just the worst. Don't you want to make the attackers' lives miserable? Because you can. And it will bring you joy. So much joy! In this free one-hour Black Hills Information Security (BHIS) webcast I'll […]