Black Hills Information Security
Penetration testing for Fortune 50 companies since 2008.
RSS
  • About Us
    • Testers
    • Admin
    • SOC/HTOC Team
    • Partners
    • Interns
    • BHIS Tribe of Companies
  • Contact
    • Contact Us
    • Email Sign-Up
  • Services
    • Active SOC
    • Blockchain Security
    • Blue Team Services
    • Hunt Teaming (HTOC)
    • Incident Response
    • Penetration Testing
  • Projects/Tools
    • All Tools
    • RITA
    • Backdoors & Breaches
    • Books
    • REKCAH
  • Learn
    • Blog
    • Conference
    • Podcasts
    • PROMPT# Zine
    • Training
    • Upcoming Events
    • Webcasts
  • Community
    • Discord
    • LinkedIn
    • Swag Request
    • T-Shirts & Hoodies
    • Twitter
    • YouTube

Author, Gabriel Prud'homme, Webcasts

Webcast: Coercions and Relays – The First Cred is the Deepest w/ Gabriel Prud’homme

Read the entire post here

Author, Tim Fowler, Webcasts

Webcast: Offensive Windows Event Logs w/ Tim Fowler

Read the entire post here

Author, Beau Bullock, Steve Borosh, Webcasts

Webcast: Demystifying Web3 Attack Vectors, w/ Beau Bullock and Steve Borosh

Read the entire post here

Author, CJ Cox, Webcasts

Webcast: Getting Started: Cybersecurity Maturity Model Certification (CMMC) w/ CJ Cox & Adam Austin

Read the entire post here

Author, Ben Burkhart, Webcasts

Webcast: How Bartending Made Me a Better Infosec Consultant w/ Ben Burkhart

Read the entire post here

Author, How-To, Troy Wojewoda, Webcasts

Webcast: How DNS can be abused for Command & Control w/ Troy Wojewoda

Read the entire post here

Author, Mike Felch, Webcasts

Webcast: Introduction to Pentesting w/ Mike Felch

Read the entire post here

Author, David Fletcher, Derek Banks, Hal Denton, Troy Wojewoda, Webcasts

Webcast: How to Detect and Respond to Business Email (M365) Compromise w/ the BHIS DFIR Team 

Read the entire post here

Author, Corey Ham, Michael Allen, Webcasts

Webcast: How to Burn Out in Infosec (and what to do next) w/ Corey Ham and Others

Read the entire post here

‹ 1 2 3 4›»

Follow Us

Looking For Something?

Browse by category

Recent Posts

  • BLOG_chalkboard_00610PNPT: Certification Review
    Daniel Pizarro // What is the PNPT?  The
  • Talkin’ About Infosec News – 1/25/2023
    00:00 – PreShow Banter™ — Wade’s Googly
  • BLOG_chalkboard_00609Start to Finish: Configuring an Android Phone for Pentesting
    Jeff Barbi // *Guest Post Background Unless

Browse by topic

Active Directory ADHD anti-virus Attack Tactics AV Beau Bullock Blue Team bypassing AV C2 Carrie Roberts command and control hacking hardware hacking Hashcat infosec Joff Thyer john strand Jordan Drysdale Kent Ickler Linux MailSniper Microsoft Nessus Password cracking password policy passwords password spraying pen-testing penetration testing pentest Pentesting phishing podcast PowerShell Python Raymond Felch Red Team red teaming RITA social engineering Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security

115 W. Hudson St. Spearfish, SD 57783 | 701-484-BHIS
© 2008

Links
Search the site