Black Hills Information Security
RSS
  • About Us
    • Security Analysts
    • Admin
    • SOC/HTOC Team
    • Partners
    • Interns
    • BHIS Tribe of Companies
  • Contact
    • Contact Us
    • Email Sign-Up
  • Services
    • Active SOC
    • ANTISOC
    • Blockchain Security
    • Blue Team Services
    • High-Profile Risk Assessments
    • Hunt Teaming (HTOC)
    • Incident Response
    • Penetration Testing
  • Projects/Tools
    • All Tools
    • RITA
    • Books
    • REKCAH
  • Learn
    • Backdoors & Breaches
    • Blog
    • Conference
    • Podcasts
    • PROMPT# Zine
    • Upcoming Events
    • Webcasts
  • Community
    • Discord
    • LinkedIn
    • T-Shirts & Hoodies
    • Twitter
    • YouTube
  • Training

Webcasts

Webcast: Firmware Enumeration Using Open Source Tools w/ Paul Asadoorian

In this Black Hills Information Security (BHIS) webcast, Paul will share free and open-source tools and techniques to evaluate the state of security on the firmware-based devices that live inside […]

Read the entire post here

Author, Chris Traynor, Webcasts

Webcast: Pentester Tactics, Techniques, and Procedures TTPs w/ Chris Traynor

Penetration Testing is often considered a dark art that’s shrouded in mystery. This unfortunate perception can hold back organizations from being more secure and keep people from an exciting career. […]

Read the entire post here

Author, Gabriel Prud'homme, Webcasts

Webcast: Coercions and Relays – The First Cred is the Deepest w/ Gabriel Prud’homme

Read the entire post here

Author, Tim Fowler, Webcasts

Webcast: Offensive Windows Event Logs w/ Tim Fowler

Read the entire post here

Author, Beau Bullock, Steve Borosh, Webcasts

Webcast: Demystifying Web3 Attack Vectors, w/ Beau Bullock and Steve Borosh

Read the entire post here

Author, CJ Cox, Webcasts

Webcast: Getting Started: Cybersecurity Maturity Model Certification (CMMC) w/ CJ Cox & Adam Austin

Read the entire post here

Author, Ben Burkhart, Webcasts

Webcast: How Bartending Made Me a Better Infosec Consultant w/ Ben Burkhart

Read the entire post here

Author, How-To, Troy Wojewoda, Webcasts

Webcast: How DNS can be abused for Command & Control w/ Troy Wojewoda

Read the entire post here

Author, Mike Felch, Webcasts

Webcast: Introduction to Pentesting w/ Mike Felch

Read the entire post here

«‹ 4 5 6 7›»

Follow Us

Looking For Something?

Browse by category

Recent Posts

  • Special Segment – Cyber Security Career Advice – 9/28/2023
  • Talkin’ About Infosec News – 9/25/2023
  • Talkin’ About Infosec News – 9/18/2023

Browse by topic

Active Directory ADHD anti-virus Attack Tactics AV Beau Bullock Blue Team bypassing AV C2 Carrie Roberts command and control hacking hardware hacking Hashcat infosec Joff Thyer john strand Jordan Drysdale Kent Ickler Linux MailSniper Malware Microsoft Nessus password policy passwords password spraying pen-testing penetration testing pentest Pentesting phishing podcast PowerShell Python Raymond Felch Red Team red teaming RITA social engineering Sysmon tools webcast webcasts Windows

Archives

Back to top
Black Hills Information Security

890 Lazelle Street, Sturgis, SD 57785-1611 | 701-484-BHIS (2447)
© 2008-2023


About Us | BHIS Tribe of Companies | Privacy Policy | Contact

Links
Search the site