This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful.
At Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls.
While many security classes can be overwhelming with the amount of data they force on you in a short period of time, this class is designed to help you focus on what matters to your day-to-day job. So no, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead, we will focus on what actually works for repelling and detecting attackers.
Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/
This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful.
At Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls.
While many security classes can be overwhelming with the amount of data they force on you in a short period of time, this class is designed to help you focus on what matters to your day-to-day job. So no, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead, we will focus on what actually works for repelling and detecting attackers.
Details