BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Black Hills Information Security, Inc. - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.blackhillsinfosec.com
X-WR-CALDESC:Events for Black Hills Information Security, Inc.
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230302T090000
DTEND;TZID=America/New_York:20230302T180000
DTSTAMP:20260412T105017
CREATED:20220920T180110Z
LAST-MODIFIED:20230209T185807Z
UID:10000890-1677747600-1677780000@www.blackhillsinfosec.com
SUMMARY:Incident Response Foundations w/ Derek Banks
DESCRIPTION:Register: https://www.antisyphontraining.com/incident-response-foundations-w-derek-banks/ \nAre you just getting started with Incident Response (IR) and not sure where to begin? Do you need to stand up an IR program or establish a Computer Security and Incident Response Team and need to get started on the right foot? \nIncident Response can be one of the most difficult aspects of Information Security and foundational skills are critical. \nThe goal of this course is to provide the core components that make up a successful Incident Response program. Students will learn how to get started on their IR journey\, what to prioritize\, and why boring stuff like policies and procedures are just as important as technical digital forensics skills. \nWe will cover the logging and monitoring capabilities necessary to be able to successfully investigate and triage an incident as well as what to do when those log sources fail. The concepts and skills introduced in this class will lay the groundwork for the next steps in the IR journey of in-depth endpoint and network forensics and analysis.
URL:https://www.blackhillsinfosec.com/event/incident-response-foundations-w-derek-banks-2/2023-03-02/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Incident_Response_Foundations.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230302T090000
DTEND;TZID=America/New_York:20230302T180000
DTSTAMP:20260412T105017
CREATED:20220920T172402Z
LAST-MODIFIED:20230209T215643Z
UID:10000908-1677747600-1677780000@www.blackhillsinfosec.com
SUMMARY:Network Forensics and Incident Response w/ Troy Wojewoda
DESCRIPTION:Register: https://www.antisyphontraining.com/network-forensics-and-detection-w-troy-wojewoda/ \nIncident responders are continually faced with the challenge of collecting and analyzing relevant event data—network communications is no exception. This course uses an assortment of network data acquisition tools and techniques with a focus on open-source\, vendor-neutral solutions. Students who take this course will learn how to perform network traffic and protocol analysis that ultimately supports cybersecurity incident response efforts. From reconnaissance to data exfiltration\, network traffic scales to provide a bird’s-eye view of attacker activity. Leveraging the vantage point of key network traffic chokepoints\, this course explores nearly every phase of an attacker’s methodology. Students will learn network traffic analysis concepts and work through hands-on lab exercises that reinforce the course material using real-world attack scenarios.
URL:https://www.blackhillsinfosec.com/event/network-forensics-and-incident-response-w-troy-wojewoda/2023-03-02/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Network-Forensics-Incident-Response-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230302T090000
DTEND;TZID=America/New_York:20230302T180000
DTSTAMP:20260412T105017
CREATED:20220920T172139Z
LAST-MODIFIED:20230209T195843Z
UID:10000906-1677747600-1677780000@www.blackhillsinfosec.com
SUMMARY:Modern WebApp Pentesting w/ BB King
DESCRIPTION:Register: https://www.antisyphontraining.com/modern-webapp-pentesting-w-bb-king/ \nModern Webapp Pentesting is unique in its approach to testing webapps. Too many courses are built around the assumption that a webapp pentester’s skills should grow along a straight line\, starting with something like the OWASP Top Ten and culminating in something like Attacking Web Cryptography. Real webapps don’t follow that same path\, and neither should real webapp pentesters. Attacking Web Sockets is not more difficult than attacking HTTP traffic\, it’s just different. Web APIs are not something you’re qualified to test only after you’ve put your time in on traditional webapps … they’re just different. \nThis course doesn’t worry about where a student falls on the imaginary scale of beginner to expert but instead focuses on finding and exploiting the kinds of issues found in real webapps today\, based on the instructor’s many years of ongoing experience in testing … real webapps today.
URL:https://www.blackhillsinfosec.com/event/modern-webapp-pentesting-w-bb-king-2/2023-03-02/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/modern-webapp-pentesting-graphic-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230302T090000
DTEND;TZID=America/New_York:20230302T180000
DTSTAMP:20260412T105018
CREATED:20220920T171541Z
LAST-MODIFIED:20230209T215840Z
UID:10000910-1677747600-1677780000@www.blackhillsinfosec.com
SUMMARY:Offensive Development w/ Greg Hatcher & John Stigerwalt
DESCRIPTION:Register: https://www.antisyphontraining.com/offensive-development-w-greg-hatcher-john-stigerwalt/ \nDive deep into cutting edge techniques that bypass or neuter modern endpoint defenses. Learn how these solutions work to mitigate their utility and hide deep within code on the endpoint. The days of downloading that binary from the internet and pointing it at a remote machine are over. Today’s defenses oftentimes call for multiple bypasses within a single piece of code. \nThis course is designed to take you deep into defensive and offensive tooling – an apex attacker must know the own indicators of compromise (IOCs) they’re creating and the artifacts they’re\nleaving behind.
URL:https://www.blackhillsinfosec.com/event/offensive-development-w-greg-hatcher-john-stigerwalt-2/2023-03-02/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Offensive-Development-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230302T090000
DTEND;TZID=America/New_York:20230302T180000
DTSTAMP:20260412T105018
CREATED:20220822T231754Z
LAST-MODIFIED:20230209T184158Z
UID:10000791-1677747600-1677780000@www.blackhillsinfosec.com
SUMMARY:Enterprise Attack Initial Access w/ Steve Borosh
DESCRIPTION:Register: https://www.antisyphontraining.com/enterprise-attack-initial-access-w-steve-borosh/ \nEnterprises have been working tirelessly to improve their security postures through defense-in-depth approaches. Offensive teams have also been putting in long hours of research into bypassing the latest EDR’s and defensive products that keep them on their toes. Long gone “hopefully” are the days of hurdling an HTA file laced with a download cradle at a mature organization with a “Free iPad” ruse and watching your screen fill with incoming agents. \nAn offense-in-depth approach may be applied to offensive practitioners looking for success against organizations well-versed in defending a large enterprise. Today’s organizations have assets in multiple geo regions\, networks\, cloud services\, border hosts\, and many of them are tied to the internal network in some way.\nThis course aims to help offensive practitioners successfully exercise their client environments from a multi-faceted approach using the latest TTPs blended with esoteric practices to gain the upper hand on your assessments.
URL:https://www.blackhillsinfosec.com/event/enterprise-attack-initial-access-w-steve-borosh-2/2023-03-02/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/Enterprise-Attack-Initial-Access.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230302T090000
DTEND;TZID=America/New_York:20230302T180000
DTSTAMP:20260412T105018
CREATED:20220822T230850Z
LAST-MODIFIED:20230209T184019Z
UID:10000789-1677747600-1677780000@www.blackhillsinfosec.com
SUMMARY:Breaching the Cloud w/ Beau Bullock
DESCRIPTION:Register: https://www.antisyphontraining.com/breaching-the-cloud-w-beau-bullock/ \nDo you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services\, Microsoft Azure\, and Google Cloud Platform. In this training course\, hacking concepts will be introduced for each of those services. \nThis training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services\, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization. \nPost-compromise techniques of cloud infrastructure differ from the techniques used in typical on-premise environments. You will learn situational awareness techniques that ultimately will impact how you will escalate privileges in the cloud. With most cloud-based authentication being publicly exposed this presents new and interesting persistence techniques that are non-existent to on-premise environments. With productivity tools like G-Suite and Microsoft 365 many organizations are making their email and other data that is normally protected by a firewall available to remote employees. You will learn how to discover\, pillage\, and exfiltrate data from these services. \nMany organizations are fully leveraging cloud services for their production infrastructure. This can include web servers\, SQL databases\, storage\, virtual machines\, and more. In this training\, you will learn how to assess and compromise these resources. Some cloud deployments are directly connected to on-premise environments via VPN. This presents an opportunity to pivot access from cloud to on-prem or vice-versa. \nFinally\, in this training\, we will not only be attacking cloud infrastructure but also leveraging it for red team operations. You will learn techniques that leverage cloud services for techniques such as phishing\, domain fronting\, and command & control. \nTools and techniques used on real-world penetration tests against cloud assets will be shared including hands-on demonstrations. At the end of this training\, you will have new skills for assessing cloud-based infrastructure!
URL:https://www.blackhillsinfosec.com/event/breaching-the-cloud-w-beau-bullock-2/2023-03-02/
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/BreachingCloud_1920x1080-1-1536x864-1.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230302T090000
DTEND;TZID=America/New_York:20230302T180000
DTSTAMP:20260412T105018
CREATED:20220822T230555Z
LAST-MODIFIED:20230209T183606Z
UID:10000787-1677747600-1677780000@www.blackhillsinfosec.com
SUMMARY:Advanced Network Threat Hunting w/ Chris Brenton
DESCRIPTION:Register: https://www.antisyphontraining.com/advanced-network-threat-hunting-w-chris-brenton/ \nSo far we’ve had over 21\,000 students attend our one-day network threat hunting course. Many have asked that we provide an extended class with more hands-on lab time. That is exactly what we have rolled into this 16-hour course! \nWe will spend most of this class analyzing pcap files for Command and Control (C2) communications in order to identify malware back channels. It is assumed that the student will already understand the basics of network threat hunting\, so we can immediately jump into applying that knowledge. The goal will be to create a threat hunting runbook that you can use within your own organization in order to identify systems that have been compromised.
URL:https://www.blackhillsinfosec.com/event/advanced-network-threat-hunting-w-chris-brenton/2023-03-02/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/Adv-Network-Threat-Hunting-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230302T090000
DTEND;TZID=America/New_York:20230302T180000
DTSTAMP:20260412T105018
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000886-1677747600-1677780000@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2023-03-02/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230302T090000
DTEND;TZID=America/New_York:20230302T180000
DTSTAMP:20260412T105018
CREATED:20220628T210910Z
LAST-MODIFIED:20230209T195723Z
UID:10000904-1677747600-1677780000@www.blackhillsinfosec.com
SUMMARY:Linux Command-Line Dojo w/ Hal Pomeranz
DESCRIPTION:Register: https://www.antisyphontraining.com/linux-command-line-dojo-w-hal-pomeranz/ \nThe DevOps folks are pushing Linux\, your red-team friends are doing serious damage with Linux-based tools\, and the Linux users on your Incident Response team are doing mysteriously powerful things. You’re ready to see if some of the Linux magic can rub off on you\, but you don’t know where to start. \nThis 16-hour course is a quick jumpstart on the Linux command-line. Start from the basics and work all the way up to command-line programming. Short learning modules and lots of practical hands-on activities will put you on the road to Linux command-line mastery. And electronic copies of everything are yours to take home\, so you can continue the learning even after class is over.
URL:https://www.blackhillsinfosec.com/event/linux-command-line-dojo-w-hal-pomeranz/2023-03-02/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/Linux-Command-Line-Dojo-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230302T090000
DTEND;TZID=America/New_York:20230302T180000
DTSTAMP:20260412T105018
CREATED:20220627T205029Z
LAST-MODIFIED:20230209T184749Z
UID:10000850-1677747600-1677780000@www.blackhillsinfosec.com
SUMMARY:HackerOps w/ Ralph May
DESCRIPTION:To conduct an advanced attack\, you need more than just a collection of simple scripts. In addition to talent\, you need a large amount of managed and unmanaged code. The more code and resources that are required to conduct an engagement\, the more time we need. Time is something we don’t have a lot of on an engagement. \nToday\, to be an advanced and effective attacker\, you need to move fast\, and that speed requires a move to a DevOps style of managing infrastructure and code. With cloud resources and APIs to manage these resources\, the days of manual setup are long behind us. \nWhere do we get started? And how does it all work? \nIn this training\, we learn the fundamentals of DevOps and how we can code our TTPs. Coding TTPs allows for new tactics and improved OPSEC to be shared without the cost of knowledge transfer and manual setup. This class will introduce students to Terraform Ansible and Docker with the goal of writing TTPs to use and share. \nIn this class\, we will learn the fundamentals of Terraform Ansible and Docker with an emphasis on how we can use these tools to code our TTPs. After we have the fundamentals\, we will start coding and get comfortable with YAML and will review how to create resources and customize TTPs. Lastly\, we will work through multiple labs and examples that you can take with you for your next engagement. \nhttps://www.antisyphontraining.com/hackerops-w-ralph-may/
URL:https://www.blackhillsinfosec.com/event/hackerops/2023-03-02/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/hackerops-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230301T120000
DTEND;TZID=America/New_York:20230301T160000
DTSTAMP:20260412T105018
CREATED:20220719T221156Z
LAST-MODIFIED:20230209T223825Z
UID:10000690-1677672000-1677686400@www.blackhillsinfosec.com
SUMMARY:Active Defense & Cyber Deception w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ \nActive Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. \nIn this class\, you will learn how to force an attacker to take more moves to attack your network. These moves may increase your ability to detect them. You will learn how to gain better attribution as to who is attacking you and why. You will also find out how to get access to a bad guy’s system. And most importantly\, you will find out how to do the above legally. \nThe current threat landscape is shifting. Traditional defenses are failing us. We need to develop new strategies to defend ourselves. Even more importantly\, we need to better understand who is attacking us and why. Some of the things we talk about you may implement immediately\, others may take you a while to implement. Either way\, consider what we discuss as a collection of tools at your disposal when you need them to annoy attackers\, attribute who is attacking you\, and finally\, attack the attackers. \nThis class is based on the DARPA funded Active Defense Harbinger Distribution live Linux environment. This VM is built from the ground up for defenders to quickly implement Active Defenses in their environments. This class is also very heavy with hands-on labs. We will not just talk about Active Defenses. We will be doing hands-on labs and through them in a way that can be quickly and easily implemented in your environment.
URL:https://www.blackhillsinfosec.com/event/active-defense-cyber-deception-w-john-strand/2023-03-01/
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/ActDefCybDecept_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230228T120000
DTEND;TZID=America/New_York:20230228T160000
DTSTAMP:20260412T105018
CREATED:20220719T221156Z
LAST-MODIFIED:20230209T223825Z
UID:10000689-1677585600-1677600000@www.blackhillsinfosec.com
SUMMARY:Active Defense & Cyber Deception w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ \nActive Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. \nIn this class\, you will learn how to force an attacker to take more moves to attack your network. These moves may increase your ability to detect them. You will learn how to gain better attribution as to who is attacking you and why. You will also find out how to get access to a bad guy’s system. And most importantly\, you will find out how to do the above legally. \nThe current threat landscape is shifting. Traditional defenses are failing us. We need to develop new strategies to defend ourselves. Even more importantly\, we need to better understand who is attacking us and why. Some of the things we talk about you may implement immediately\, others may take you a while to implement. Either way\, consider what we discuss as a collection of tools at your disposal when you need them to annoy attackers\, attribute who is attacking you\, and finally\, attack the attackers. \nThis class is based on the DARPA funded Active Defense Harbinger Distribution live Linux environment. This VM is built from the ground up for defenders to quickly implement Active Defenses in their environments. This class is also very heavy with hands-on labs. We will not just talk about Active Defenses. We will be doing hands-on labs and through them in a way that can be quickly and easily implemented in your environment.
URL:https://www.blackhillsinfosec.com/event/active-defense-cyber-deception-w-john-strand/2023-02-28/
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/ActDefCybDecept_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230227T110000
DTEND;TZID=America/New_York:20230227T160000
DTSTAMP:20260412T105018
CREATED:20220719T221156Z
LAST-MODIFIED:20230209T223825Z
UID:10000688-1677495600-1677513600@www.blackhillsinfosec.com
SUMMARY:Active Defense & Cyber Deception w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/ \nActive Defenses have been capturing a large amount of attention in the media lately. There are those who thirst for vengeance and want to directly attack the attackers. There are those who believe that any sort of active response directed at an attacker is wrong. We believe the answer is somewhere in between. \nIn this class\, you will learn how to force an attacker to take more moves to attack your network. These moves may increase your ability to detect them. You will learn how to gain better attribution as to who is attacking you and why. You will also find out how to get access to a bad guy’s system. And most importantly\, you will find out how to do the above legally. \nThe current threat landscape is shifting. Traditional defenses are failing us. We need to develop new strategies to defend ourselves. Even more importantly\, we need to better understand who is attacking us and why. Some of the things we talk about you may implement immediately\, others may take you a while to implement. Either way\, consider what we discuss as a collection of tools at your disposal when you need them to annoy attackers\, attribute who is attacking you\, and finally\, attack the attackers. \nThis class is based on the DARPA funded Active Defense Harbinger Distribution live Linux environment. This VM is built from the ground up for defenders to quickly implement Active Defenses in their environments. This class is also very heavy with hands-on labs. We will not just talk about Active Defenses. We will be doing hands-on labs and through them in a way that can be quickly and easily implemented in your environment.
URL:https://www.blackhillsinfosec.com/event/active-defense-cyber-deception-w-john-strand/2023-02-27/
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/ActDefCybDecept_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230126T120000
DTEND;TZID=America/New_York:20230126T160000
DTSTAMP:20260412T105018
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000663-1674734400-1674748800@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2023-01-26/
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230125T120000
DTEND;TZID=America/New_York:20230125T160000
DTSTAMP:20260412T105018
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000662-1674648000-1674662400@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2023-01-25/
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230124T120000
DTEND;TZID=America/New_York:20230124T160000
DTSTAMP:20260412T105018
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000661-1674561600-1674576000@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2023-01-24/
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230123T110000
DTEND;TZID=America/New_York:20230123T160000
DTSTAMP:20260412T105018
CREATED:20220628T214206Z
LAST-MODIFIED:20230829T223957Z
UID:10000660-1674471600-1674489600@www.blackhillsinfosec.com
SUMMARY:Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/ \nThis 16-hour (4-days\, 4-hour sessions) information security training class is designed for people who are new to computer security. We will cover the core fundamentals with lots of hands-on labs demonstrating the attacks and defenses every security professional must know to be successful. \nAt Black Hills Information Security we conduct over 500 security assessments per year. This Antisyphon training class takes the top vulnerabilities we discover and boils it down to the top 11 things every organization should be doing to protect themselves. We call this the Atomic Controls. \nWhile many security classes can be overwhelming with the amount of data they force on you in a short period of time\, this class is designed to help you focus on what matters to your day-to-day job. So no\, we are not going to force you to learn archaic technologies and the underpinnings of crypto algorithms. Instead\, we will focus on what actually works for repelling and detecting attackers.
URL:https://www.blackhillsinfosec.com/event/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/2023-01-23/
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2021/10/Training_GettingStarted_BHIMITREATTACK_1920x1080.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221216T120000
DTEND;TZID=America/New_York:20221216T160000
DTSTAMP:20260412T105018
CREATED:20220920T183219Z
LAST-MODIFIED:20220920T183219Z
UID:10000599-1671192000-1671206400@www.blackhillsinfosec.com
SUMMARY:Applied Purple Teaming w/ Kent Ickler and Jordan Drysdale
DESCRIPTION:Register: https://www.antisyphontraining.com/applied-purple-teaming-w-kent-ickler-and-jordan-drysdale/ \nYou’ve heard this story before. Bad actor walks into a network and pillages the place in swift action. CIO asks: “Where did we go wrong?” SysAdmin replies “our password\, remote access\, workstation restriction\, and lack of application safelisting policies. Oh\, and our SIEM didn’t notify us. We just weren’t ready for that attack.” \nIn a significant change from the original course\, students will be introduced to Microsoft Azure and Sentinel. Each student will be responsible for deploying a cloud lab that includes an Active Directory domain\, a C2 server\, and integration with AZ Sentinel’s detection platform. All of this will be taught through a proven framework for purple team operations that results in better business outcomes. \nEach student will then pollute the AD domain with garbage using BadBlood and wreak havoc on the environment through an updated iteration of the following labs: \n\nOrganizational reconnaissance\nBloodhound\, Sharphound\, and Neo4j\nPlumhound\nGroup policy preferences\nCommand and control operations\nCanary accounts for detecting password sprays and Kerberoasting\nFile share poisoning via URL and LNK files\nPass the hash attacks\nDCSync operations\nPassword cracking with John the Ripper\nKerberoasting attacks\nAtomic Red Team\n….and more….\n\nStudents will have an opportunity to attack their own in-class Active Directory environment with Red Team tactics\, implement Blue Team defensery\, and manage an environment designed to prevent\, slow\, identify\, and highlight attacks. Additionally\, the course will guide students through configuring no-nonsense attack identification and alerting that is essential to an effective SOC operation. \nIn a live environment\, students will have the opportunity to demonstrate a secured enterprise by utilizing the MITRE ATT&CK Framework\, Red Team tactics\, and Blue Team defenses to identify\, slow\, and stop attacks. \nImplement better security and tell your CIO how everything went right!
URL:https://www.blackhillsinfosec.com/event/applied-purple-teaming-w-kent-ickler-and-jordan-drysdale/2022-12-16/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2016/03/Applied-purple-teaming-graphic-1024x576-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221215T120000
DTEND;TZID=America/New_York:20221215T160000
DTSTAMP:20260412T105018
CREATED:20220920T183219Z
LAST-MODIFIED:20220920T183219Z
UID:10000598-1671105600-1671120000@www.blackhillsinfosec.com
SUMMARY:Applied Purple Teaming w/ Kent Ickler and Jordan Drysdale
DESCRIPTION:Register: https://www.antisyphontraining.com/applied-purple-teaming-w-kent-ickler-and-jordan-drysdale/ \nYou’ve heard this story before. Bad actor walks into a network and pillages the place in swift action. CIO asks: “Where did we go wrong?” SysAdmin replies “our password\, remote access\, workstation restriction\, and lack of application safelisting policies. Oh\, and our SIEM didn’t notify us. We just weren’t ready for that attack.” \nIn a significant change from the original course\, students will be introduced to Microsoft Azure and Sentinel. Each student will be responsible for deploying a cloud lab that includes an Active Directory domain\, a C2 server\, and integration with AZ Sentinel’s detection platform. All of this will be taught through a proven framework for purple team operations that results in better business outcomes. \nEach student will then pollute the AD domain with garbage using BadBlood and wreak havoc on the environment through an updated iteration of the following labs: \n\nOrganizational reconnaissance\nBloodhound\, Sharphound\, and Neo4j\nPlumhound\nGroup policy preferences\nCommand and control operations\nCanary accounts for detecting password sprays and Kerberoasting\nFile share poisoning via URL and LNK files\nPass the hash attacks\nDCSync operations\nPassword cracking with John the Ripper\nKerberoasting attacks\nAtomic Red Team\n….and more….\n\nStudents will have an opportunity to attack their own in-class Active Directory environment with Red Team tactics\, implement Blue Team defensery\, and manage an environment designed to prevent\, slow\, identify\, and highlight attacks. Additionally\, the course will guide students through configuring no-nonsense attack identification and alerting that is essential to an effective SOC operation. \nIn a live environment\, students will have the opportunity to demonstrate a secured enterprise by utilizing the MITRE ATT&CK Framework\, Red Team tactics\, and Blue Team defenses to identify\, slow\, and stop attacks. \nImplement better security and tell your CIO how everything went right!
URL:https://www.blackhillsinfosec.com/event/applied-purple-teaming-w-kent-ickler-and-jordan-drysdale/2022-12-15/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2016/03/Applied-purple-teaming-graphic-1024x576-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221214T120000
DTEND;TZID=America/New_York:20221214T160000
DTSTAMP:20260412T105018
CREATED:20220920T183219Z
LAST-MODIFIED:20220920T183219Z
UID:10000597-1671019200-1671033600@www.blackhillsinfosec.com
SUMMARY:Applied Purple Teaming w/ Kent Ickler and Jordan Drysdale
DESCRIPTION:Register: https://www.antisyphontraining.com/applied-purple-teaming-w-kent-ickler-and-jordan-drysdale/ \nYou’ve heard this story before. Bad actor walks into a network and pillages the place in swift action. CIO asks: “Where did we go wrong?” SysAdmin replies “our password\, remote access\, workstation restriction\, and lack of application safelisting policies. Oh\, and our SIEM didn’t notify us. We just weren’t ready for that attack.” \nIn a significant change from the original course\, students will be introduced to Microsoft Azure and Sentinel. Each student will be responsible for deploying a cloud lab that includes an Active Directory domain\, a C2 server\, and integration with AZ Sentinel’s detection platform. All of this will be taught through a proven framework for purple team operations that results in better business outcomes. \nEach student will then pollute the AD domain with garbage using BadBlood and wreak havoc on the environment through an updated iteration of the following labs: \n\nOrganizational reconnaissance\nBloodhound\, Sharphound\, and Neo4j\nPlumhound\nGroup policy preferences\nCommand and control operations\nCanary accounts for detecting password sprays and Kerberoasting\nFile share poisoning via URL and LNK files\nPass the hash attacks\nDCSync operations\nPassword cracking with John the Ripper\nKerberoasting attacks\nAtomic Red Team\n….and more….\n\nStudents will have an opportunity to attack their own in-class Active Directory environment with Red Team tactics\, implement Blue Team defensery\, and manage an environment designed to prevent\, slow\, identify\, and highlight attacks. Additionally\, the course will guide students through configuring no-nonsense attack identification and alerting that is essential to an effective SOC operation. \nIn a live environment\, students will have the opportunity to demonstrate a secured enterprise by utilizing the MITRE ATT&CK Framework\, Red Team tactics\, and Blue Team defenses to identify\, slow\, and stop attacks. \nImplement better security and tell your CIO how everything went right!
URL:https://www.blackhillsinfosec.com/event/applied-purple-teaming-w-kent-ickler-and-jordan-drysdale/2022-12-14/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2016/03/Applied-purple-teaming-graphic-1024x576-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221213T120000
DTEND;TZID=America/New_York:20221213T160000
DTSTAMP:20260412T105018
CREATED:20220920T183219Z
LAST-MODIFIED:20220920T183219Z
UID:10000596-1670932800-1670947200@www.blackhillsinfosec.com
SUMMARY:Applied Purple Teaming w/ Kent Ickler and Jordan Drysdale
DESCRIPTION:Register: https://www.antisyphontraining.com/applied-purple-teaming-w-kent-ickler-and-jordan-drysdale/ \nYou’ve heard this story before. Bad actor walks into a network and pillages the place in swift action. CIO asks: “Where did we go wrong?” SysAdmin replies “our password\, remote access\, workstation restriction\, and lack of application safelisting policies. Oh\, and our SIEM didn’t notify us. We just weren’t ready for that attack.” \nIn a significant change from the original course\, students will be introduced to Microsoft Azure and Sentinel. Each student will be responsible for deploying a cloud lab that includes an Active Directory domain\, a C2 server\, and integration with AZ Sentinel’s detection platform. All of this will be taught through a proven framework for purple team operations that results in better business outcomes. \nEach student will then pollute the AD domain with garbage using BadBlood and wreak havoc on the environment through an updated iteration of the following labs: \n\nOrganizational reconnaissance\nBloodhound\, Sharphound\, and Neo4j\nPlumhound\nGroup policy preferences\nCommand and control operations\nCanary accounts for detecting password sprays and Kerberoasting\nFile share poisoning via URL and LNK files\nPass the hash attacks\nDCSync operations\nPassword cracking with John the Ripper\nKerberoasting attacks\nAtomic Red Team\n….and more….\n\nStudents will have an opportunity to attack their own in-class Active Directory environment with Red Team tactics\, implement Blue Team defensery\, and manage an environment designed to prevent\, slow\, identify\, and highlight attacks. Additionally\, the course will guide students through configuring no-nonsense attack identification and alerting that is essential to an effective SOC operation. \nIn a live environment\, students will have the opportunity to demonstrate a secured enterprise by utilizing the MITRE ATT&CK Framework\, Red Team tactics\, and Blue Team defenses to identify\, slow\, and stop attacks. \nImplement better security and tell your CIO how everything went right!
URL:https://www.blackhillsinfosec.com/event/applied-purple-teaming-w-kent-ickler-and-jordan-drysdale/2022-12-13/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2016/03/Applied-purple-teaming-graphic-1024x576-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221209T120000
DTEND;TZID=America/New_York:20221209T160000
DTSTAMP:20260412T105018
CREATED:20220628T202847Z
LAST-MODIFIED:20220920T181037Z
UID:10000595-1670587200-1670601600@www.blackhillsinfosec.com
SUMMARY:Breaching the Cloud w/ Beau Bullock
DESCRIPTION:Register: https://www.antisyphontraining.com/breaching-the-cloud-w-beau-bullock/ \nDo you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services\, Microsoft Azure\, and Google Cloud Platform. In this training course\, hacking concepts will be introduced for each of those services. \nThis training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services\, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization. \nPost-compromise techniques of cloud infrastructure differ from the techniques used in typical on-premise environments. You will learn situational awareness techniques that ultimately will impact how you will escalate privileges in the cloud. With most cloud-based authentication being publicly exposed this presents new and interesting persistence techniques that are non-existent to on-premise environments. With productivity tools like G-Suite and Microsoft 365 many organizations are making their email and other data that is normally protected by a firewall available to remote employees. You will learn how to discover\, pillage\, and exfiltrate data from these services. \nMany organizations are fully leveraging cloud services for their production infrastructure. This can include web servers\, SQL databases\, storage\, virtual machines\, and more. In this training\, you will learn how to assess and compromise these resources. Some cloud deployments are directly connected to on-premise environments via VPN. This presents an opportunity to pivot access from cloud to on-prem or vice-versa. \nFinally\, in this training\, we will not only be attacking cloud infrastructure but also leveraging it for red team operations. You will learn techniques that leverage cloud services for techniques such as phishing\, domain fronting\, and command & control. \nTools and techniques used on real-world penetration tests against cloud assets will be shared including hands-on demonstrations. At the end of this training\, you will have new skills for assessing cloud-based infrastructure! \n\n\n\n 
URL:https://www.blackhillsinfosec.com/event/breaching-the-cloud-w-beau-bullock/2022-12-09/
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/BreachingCloud_1920x1080-1-1536x864-1.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221209T120000
DTEND;TZID=America/New_York:20221209T160000
DTSTAMP:20260412T105018
CREATED:20220627T202859Z
LAST-MODIFIED:20220920T181251Z
UID:10000575-1670587200-1670601600@www.blackhillsinfosec.com
SUMMARY:Security Defense and Detection TTX w/ Amanda Berlin and Jeremy Mio
DESCRIPTION:Security Defense and Detection TTX is a comprehensive four-day tabletop exercise that involves the introduction to completion of security TTXs (tabletop exercises)\, IR playbooks\, and after-action reports. The exercises are paired with video and lab demonstrations that reinforce their purpose. The training as a whole is compatible with the world’s most popular RPG rules. \nThe preparation phase will walk students through the creation of specific IR playbooks that can be utilized in any environment as well as during later parts of the class. The next phase introduces the gamification of the TTXs. The students split up into separate “corporations” with assigned verticals\, hit points\, armor class\, budgets\, strengths\, and weaknesses. Selection of departments and skills allow the players to further their modifiers. Throughout the exercise\, each company will take turns rolling their way through decisions such as large purchases\, attack severity\, defense capability\, and incident response decisions. \nhttps://www.antisyphontraining.com/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/
URL:https://www.blackhillsinfosec.com/event/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/2022-12-09/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/Security-Defense-and-Detection-TTX.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221208T120000
DTEND;TZID=America/New_York:20221208T160000
DTSTAMP:20260412T105018
CREATED:20220628T202847Z
LAST-MODIFIED:20220920T181037Z
UID:10000594-1670500800-1670515200@www.blackhillsinfosec.com
SUMMARY:Breaching the Cloud w/ Beau Bullock
DESCRIPTION:Register: https://www.antisyphontraining.com/breaching-the-cloud-w-beau-bullock/ \nDo you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services\, Microsoft Azure\, and Google Cloud Platform. In this training course\, hacking concepts will be introduced for each of those services. \nThis training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services\, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization. \nPost-compromise techniques of cloud infrastructure differ from the techniques used in typical on-premise environments. You will learn situational awareness techniques that ultimately will impact how you will escalate privileges in the cloud. With most cloud-based authentication being publicly exposed this presents new and interesting persistence techniques that are non-existent to on-premise environments. With productivity tools like G-Suite and Microsoft 365 many organizations are making their email and other data that is normally protected by a firewall available to remote employees. You will learn how to discover\, pillage\, and exfiltrate data from these services. \nMany organizations are fully leveraging cloud services for their production infrastructure. This can include web servers\, SQL databases\, storage\, virtual machines\, and more. In this training\, you will learn how to assess and compromise these resources. Some cloud deployments are directly connected to on-premise environments via VPN. This presents an opportunity to pivot access from cloud to on-prem or vice-versa. \nFinally\, in this training\, we will not only be attacking cloud infrastructure but also leveraging it for red team operations. You will learn techniques that leverage cloud services for techniques such as phishing\, domain fronting\, and command & control. \nTools and techniques used on real-world penetration tests against cloud assets will be shared including hands-on demonstrations. At the end of this training\, you will have new skills for assessing cloud-based infrastructure! \n\n\n\n 
URL:https://www.blackhillsinfosec.com/event/breaching-the-cloud-w-beau-bullock/2022-12-08/
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/BreachingCloud_1920x1080-1-1536x864-1.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221208T120000
DTEND;TZID=America/New_York:20221208T160000
DTSTAMP:20260412T105018
CREATED:20220627T202859Z
LAST-MODIFIED:20220920T181251Z
UID:10000574-1670500800-1670515200@www.blackhillsinfosec.com
SUMMARY:Security Defense and Detection TTX w/ Amanda Berlin and Jeremy Mio
DESCRIPTION:Security Defense and Detection TTX is a comprehensive four-day tabletop exercise that involves the introduction to completion of security TTXs (tabletop exercises)\, IR playbooks\, and after-action reports. The exercises are paired with video and lab demonstrations that reinforce their purpose. The training as a whole is compatible with the world’s most popular RPG rules. \nThe preparation phase will walk students through the creation of specific IR playbooks that can be utilized in any environment as well as during later parts of the class. The next phase introduces the gamification of the TTXs. The students split up into separate “corporations” with assigned verticals\, hit points\, armor class\, budgets\, strengths\, and weaknesses. Selection of departments and skills allow the players to further their modifiers. Throughout the exercise\, each company will take turns rolling their way through decisions such as large purchases\, attack severity\, defense capability\, and incident response decisions. \nhttps://www.antisyphontraining.com/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/
URL:https://www.blackhillsinfosec.com/event/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/2022-12-08/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/Security-Defense-and-Detection-TTX.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221208T110000
DTEND;TZID=America/New_York:20221208T160000
DTSTAMP:20260412T105018
CREATED:20221206T211109Z
LAST-MODIFIED:20230209T190439Z
UID:10000895-1670497200-1670515200@www.blackhillsinfosec.com
SUMMARY:Introduction to Pentesting w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/introduction-to-pentesting/ \nAre you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements\, operational phases\, and a constant flood of new vulnerabilities hitting the industry\, the journey into penetration testing can quickly become confusing. \nIn this training course\, we will examine the different types of penetration testing engagements and take a deep dive into establishing a repeatable testing methodology for executing quality tests. We will look at some tools of the trade to understand what they are doing under the hood\, identify what separates a great finding from a good finding in reports\, and really zero in on establishing your own methodology! \nBy the end of the training\, you can expect to leave with a firm understanding of how pentests are executed and a newfound comfortability performing penetration tests. We will also provide numerous resources and tools that will help you pave your way into a pentesting career!
URL:https://www.blackhillsinfosec.com/event/introduction-to-pentesting-w-john-strand-2/2022-12-08/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/12/Introduction-to-Pentesting-1536x860-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221207T120000
DTEND;TZID=America/New_York:20221207T160000
DTSTAMP:20260412T105018
CREATED:20220628T202847Z
LAST-MODIFIED:20220920T181037Z
UID:10000593-1670414400-1670428800@www.blackhillsinfosec.com
SUMMARY:Breaching the Cloud w/ Beau Bullock
DESCRIPTION:Register: https://www.antisyphontraining.com/breaching-the-cloud-w-beau-bullock/ \nDo you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services\, Microsoft Azure\, and Google Cloud Platform. In this training course\, hacking concepts will be introduced for each of those services. \nThis training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services\, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization. \nPost-compromise techniques of cloud infrastructure differ from the techniques used in typical on-premise environments. You will learn situational awareness techniques that ultimately will impact how you will escalate privileges in the cloud. With most cloud-based authentication being publicly exposed this presents new and interesting persistence techniques that are non-existent to on-premise environments. With productivity tools like G-Suite and Microsoft 365 many organizations are making their email and other data that is normally protected by a firewall available to remote employees. You will learn how to discover\, pillage\, and exfiltrate data from these services. \nMany organizations are fully leveraging cloud services for their production infrastructure. This can include web servers\, SQL databases\, storage\, virtual machines\, and more. In this training\, you will learn how to assess and compromise these resources. Some cloud deployments are directly connected to on-premise environments via VPN. This presents an opportunity to pivot access from cloud to on-prem or vice-versa. \nFinally\, in this training\, we will not only be attacking cloud infrastructure but also leveraging it for red team operations. You will learn techniques that leverage cloud services for techniques such as phishing\, domain fronting\, and command & control. \nTools and techniques used on real-world penetration tests against cloud assets will be shared including hands-on demonstrations. At the end of this training\, you will have new skills for assessing cloud-based infrastructure! \n\n\n\n 
URL:https://www.blackhillsinfosec.com/event/breaching-the-cloud-w-beau-bullock/2022-12-07/
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/BreachingCloud_1920x1080-1-1536x864-1.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221207T120000
DTEND;TZID=America/New_York:20221207T160000
DTSTAMP:20260412T105018
CREATED:20220627T202859Z
LAST-MODIFIED:20220920T181251Z
UID:10000573-1670414400-1670428800@www.blackhillsinfosec.com
SUMMARY:Security Defense and Detection TTX w/ Amanda Berlin and Jeremy Mio
DESCRIPTION:Security Defense and Detection TTX is a comprehensive four-day tabletop exercise that involves the introduction to completion of security TTXs (tabletop exercises)\, IR playbooks\, and after-action reports. The exercises are paired with video and lab demonstrations that reinforce their purpose. The training as a whole is compatible with the world’s most popular RPG rules. \nThe preparation phase will walk students through the creation of specific IR playbooks that can be utilized in any environment as well as during later parts of the class. The next phase introduces the gamification of the TTXs. The students split up into separate “corporations” with assigned verticals\, hit points\, armor class\, budgets\, strengths\, and weaknesses. Selection of departments and skills allow the players to further their modifiers. Throughout the exercise\, each company will take turns rolling their way through decisions such as large purchases\, attack severity\, defense capability\, and incident response decisions. \nhttps://www.antisyphontraining.com/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/
URL:https://www.blackhillsinfosec.com/event/security-defense-and-detection-ttx-w-amanda-berlin-and-jeremy-mio/2022-12-07/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/Security-Defense-and-Detection-TTX.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221207T110000
DTEND;TZID=America/New_York:20221207T160000
DTSTAMP:20260412T105018
CREATED:20221206T211109Z
LAST-MODIFIED:20230209T190439Z
UID:10000894-1670410800-1670428800@www.blackhillsinfosec.com
SUMMARY:Introduction to Pentesting w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/introduction-to-pentesting/ \nAre you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements\, operational phases\, and a constant flood of new vulnerabilities hitting the industry\, the journey into penetration testing can quickly become confusing. \nIn this training course\, we will examine the different types of penetration testing engagements and take a deep dive into establishing a repeatable testing methodology for executing quality tests. We will look at some tools of the trade to understand what they are doing under the hood\, identify what separates a great finding from a good finding in reports\, and really zero in on establishing your own methodology! \nBy the end of the training\, you can expect to leave with a firm understanding of how pentests are executed and a newfound comfortability performing penetration tests. We will also provide numerous resources and tools that will help you pave your way into a pentesting career!
URL:https://www.blackhillsinfosec.com/event/introduction-to-pentesting-w-john-strand-2/2022-12-07/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/12/Introduction-to-Pentesting-1536x860-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221206T110000
DTEND;TZID=America/New_York:20221206T160000
DTSTAMP:20260412T105018
CREATED:20221206T211109Z
LAST-MODIFIED:20230209T190439Z
UID:10000893-1670324400-1670342400@www.blackhillsinfosec.com
SUMMARY:Introduction to Pentesting w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/introduction-to-pentesting/ \nAre you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements\, operational phases\, and a constant flood of new vulnerabilities hitting the industry\, the journey into penetration testing can quickly become confusing. \nIn this training course\, we will examine the different types of penetration testing engagements and take a deep dive into establishing a repeatable testing methodology for executing quality tests. We will look at some tools of the trade to understand what they are doing under the hood\, identify what separates a great finding from a good finding in reports\, and really zero in on establishing your own methodology! \nBy the end of the training\, you can expect to leave with a firm understanding of how pentests are executed and a newfound comfortability performing penetration tests. We will also provide numerous resources and tools that will help you pave your way into a pentesting career!
URL:https://www.blackhillsinfosec.com/event/introduction-to-pentesting-w-john-strand-2/2022-12-06/
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/12/Introduction-to-Pentesting-1536x860-1.png
END:VEVENT
END:VCALENDAR