BHIS | Talkin’ Bout Infosec News
BHIS | Talkin’ Bout Infosec News
Join the BHIS team as we talk about current infosec news. Streamed live every Monday @ 4:30 pm. https://www.youtube.com/BlackHillsInformationSecurity
Join the BHIS team as we talk about current infosec news. Streamed live every Monday @ 4:30 pm. https://www.youtube.com/BlackHillsInformationSecurity
The Red Team Fundamentals for Active Directory course is an 8-hour class focused on explaining the fundamentals of Active Directory and how different aspects can be exploited when performing penetration tests. The goal is not only to cover different attacks but also explain the details of why they work and how an environment can be […]
Dive deep into cutting-edge techniques that bypass or neuter modern endpoint defenses. Learn how these solutions work in order to mitigate their utility and hide deep within code on the endpoint. The days of downloading that binary from GitHub and pointing it at a box are over. Today’s defenses oftentimes call for multiple bypasses within […]
AASLR will have infosec professionals sharing their knowledge on tools, techniques, and procedures and then answering a lot of your questions on everything you can think to ask. Streamed live every Tuesday and Wednesday @ 4:30 pm. https://www.twitch.tv/antisyphon
The Red Team Fundamentals for Active Directory course is an 8-hour class focused on explaining the fundamentals of Active Directory and how different aspects can be exploited when performing penetration tests. The goal is not only to cover different attacks but also explain the details of why they work and how an environment can be […]
Dive deep into cutting-edge techniques that bypass or neuter modern endpoint defenses. Learn how these solutions work in order to mitigate their utility and hide deep within code on the endpoint. The days of downloading that binary from GitHub and pointing it at a box are over. Today’s defenses oftentimes call for multiple bypasses within […]
AASLR will have infosec professionals sharing their knowledge on tools, techniques, and procedures and then answering a lot of your questions on everything you can think to ask. Streamed live every Tuesday and Wednesday @ 4:30 pm. https://www.twitch.tv/antisyphon
Dive deep into cutting-edge techniques that bypass or neuter modern endpoint defenses. Learn how these solutions work in order to mitigate their utility and hide deep within code on the endpoint. The days of downloading that binary from GitHub and pointing it at a box are over. Today’s defenses oftentimes call for multiple bypasses within […]
Thursday, August 4, 2022 – 2 pm EST (UTC -4) Register: https://zoom.us/webinar/register/WN_F8ALJZgMQ8emb3usRD7U3A In this webcast, John will rant. Sorry. More specifically, he is going to talk about his worst customer experiences and how to avoid them. Yes, he will talk about lawyers. Yes, he will talk about scope creep. Yes, he will talk about how […]
Dive deep into cutting-edge techniques that bypass or neuter modern endpoint defenses. Learn how these solutions work in order to mitigate their utility and hide deep within code on the endpoint. The days of downloading that binary from GitHub and pointing it at a box are over. Today’s defenses oftentimes call for multiple bypasses within […]
Join the BHIS team as we talk about current infosec news. Streamed live every Monday @ 4:30 pm. https://www.youtube.com/BlackHillsInformationSecurity
AASLR will have infosec professionals sharing their knowledge on tools, techniques, and procedures and then answering a lot of your questions on everything you can think to ask. Streamed live every Tuesday and Wednesday @ 4:30 pm. https://www.twitch.tv/antisyphon
AASLR will have infosec professionals sharing their knowledge on tools, techniques, and procedures and then answering a lot of your questions on everything you can think to ask. Streamed live every Tuesday and Wednesday @ 4:30 pm. https://www.twitch.tv/antisyphon
Thursday, August 11, 2022 – 1 pm (UTC -4) Register: https://zoom.us/webinar/register/WN_lav-QqASTUi--pAp7reMgA
This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. At Black Hills Information Security we conduct over 500 security assessments per […]
Join the BHIS team as we talk about current infosec news. Streamed live every Monday @ 4:30 pm. https://www.youtube.com/BlackHillsInformationSecurity
This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. At Black Hills Information Security we conduct over 500 security assessments per […]
https://www.antisyphontraining.com/security-leadership-and-management-w-chris-brenton/
AASLR will have infosec professionals sharing their knowledge on tools, techniques, and procedures and then answering a lot of your questions on everything you can think to ask. Streamed live every Tuesday and Wednesday @ 4:30 pm. https://www.twitch.tv/antisyphon
This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. At Black Hills Information Security we conduct over 500 security assessments per […]
https://www.antisyphontraining.com/security-leadership-and-management-w-chris-brenton/
AASLR will have infosec professionals sharing their knowledge on tools, techniques, and procedures and then answering a lot of your questions on everything you can think to ask. Streamed live every Tuesday and Wednesday @ 4:30 pm. https://www.twitch.tv/antisyphon
This 16-hour (4-days, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. At Black Hills Information Security we conduct over 500 security assessments per […]
https://www.antisyphontraining.com/security-leadership-and-management-w-chris-brenton/
https://www.antisyphontraining.com/security-leadership-and-management-w-chris-brenton/
Join the BHIS team as we talk about current infosec news. Streamed live every Monday @ 4:30 pm. https://www.youtube.com/BlackHillsInformationSecurity
Since 2003, OWASP has released the Top 10 Most Critical Web Application Security Risks list. It has been the basis of much development and consternation, but do you really understand what each of these issues and their corresponding controls mean? As a developer, do you know how to prevent these issues? As a security professional, […]
Ever wondered how purple teaming can supercharge your cyber capability? In this 16-hour, hands-on course, attendees will learn the balance between threat understanding and detection understanding to run their own purple team exercises. Attendees will start by learning the underlying methodologies that make purple teaming successful and metrics for success before diving into leveraging the […]
https://www.antisyphontraining.com/enterprise-attack-initial-access-w-steve-borosh/
Since 2003, OWASP has released the Top 10 Most Critical Web Application Security Risks list. It has been the basis of much development and consternation, but do you really understand what each of these issues and their corresponding controls mean? As a developer, do you know how to prevent these issues? As a security professional, […]
Ever wondered how purple teaming can supercharge your cyber capability? In this 16-hour, hands-on course, attendees will learn the balance between threat understanding and detection understanding to run their own purple team exercises. Attendees will start by learning the underlying methodologies that make purple teaming successful and metrics for success before diving into leveraging the […]
https://www.antisyphontraining.com/enterprise-attack-initial-access-w-steve-borosh/
To conduct an advanced attack, you need more than just a collection of simple scripts. In addition to talent, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement, the more time we need. Time is something we don’t have a lot of […]
https://www.antisyphontraining.com/enterprise-attack-initial-access-w-steve-borosh/
Ever wondered how purple teaming can supercharge your cyber capability? In this 16-hour, hands-on course, attendees will learn the balance between threat understanding and detection understanding to run their own purple team exercises. Attendees will start by learning the underlying methodologies that make purple teaming successful and metrics for success before diving into leveraging the […]
To conduct an advanced attack, you need more than just a collection of simple scripts. In addition to talent, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement, the more time we need. Time is something we don’t have a lot of […]
https://www.antisyphontraining.com/enterprise-attack-initial-access-w-steve-borosh/
Ever wondered how purple teaming can supercharge your cyber capability? In this 16-hour, hands-on course, attendees will learn the balance between threat understanding and detection understanding to run their own purple team exercises. Attendees will start by learning the underlying methodologies that make purple teaming successful and metrics for success before diving into leveraging the […]
Active Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. In this […]
In this class, Kip shows InfoSec supervisors how to build the team of their dreams. Students will learn how to attract and retain top tier talent. The kind of talented people who could work anywhere, but choose to work with you. Team members who get stuff done and don’t think much about changing employers. What’s […]
This 16-hour Information Security training class is targeted for newly appointed or dual-roled (your primary job + security) security professionals within a Small or Medium Business (SMB) or similar sized organization. SMBs and organizations face unique challenges in Information Security yet are often presented with solutions that may be out of reach due to cost, […]
Active Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. In this […]
For most security teams, high operational tempo (measured in dumpster fire lumens) incentivizes analysts to stick to well-tailored playbooks that prioritize remediation at the expense of proper incident scoping and root cause analysis. Though modern endpoint security products have significantly improved host visibility, most critical incidents will require the acquisition and analysis of additional endpoint […]
This 16-hour Information Security training class is targeted for newly appointed or dual-roled (your primary job + security) security professionals within a Small or Medium Business (SMB) or similar sized organization. SMBs and organizations face unique challenges in Information Security yet are often presented with solutions that may be out of reach due to cost, […]
Active Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. In this […]
For most security teams, high operational tempo (measured in dumpster fire lumens) incentivizes analysts to stick to well-tailored playbooks that prioritize remediation at the expense of proper incident scoping and root cause analysis. Though modern endpoint security products have significantly improved host visibility, most critical incidents will require the acquisition and analysis of additional endpoint […]
In this class, Kip shows InfoSec supervisors how to build the team of their dreams. Students will learn how to attract and retain top tier talent. The kind of talented people who could work anywhere, but choose to work with you. Team members who get stuff done and don’t think much about changing employers. What’s […]