Introduction to Pentesting w/ John Strand
Are you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements, operational phases, and a […]
Are you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements, operational phases, and a […]
Register: https://www.antisyphontraining.com/linux-forensics-w-hal-pomeranz/ Linux is everywhere– running in the cloud, on cell phones, and in embedded devices that make up the “Internet of Things”. Often neglected by their owners, vulnerable Linux […]
Register: https://www.antisyphontraining.com/offensive-development-w-greg-hatcher-john-stigerwalt/ Dive deep into cutting edge techniques that bypass or neuter modern endpoint defenses. Learn how these solutions work to mitigate their utility and hide deep within code on […]
Register: https://www.antisyphontraining.com/operation-purple-w-tim-schulz/ Ever wondered how purple teaming can supercharge your cyber capability? In this 16-hour, hands-on course, attendees will learn the balance between threat understanding and detection understanding to run […]
Register: https://www.antisyphontraining.com/modern-webapp-pentesting-w-bb-king/ Modern Webapp Pentesting is unique in its approach to testing webapps. Too many courses are built around the assumption that a webapp pentester’s skills should grow along a straight […]
Register: https://www.antisyphontraining.com/network-forensics-and-detection-w-troy-wojewoda/ Incident responders are continually faced with the challenge of collecting and analyzing relevant event data—network communications is no exception. This course uses an assortment of network data acquisition […]
Register: https://www.antisyphontraining.com/securing-the-cloud-foundations-w-andrew-krug/ In this course, we’ll explore Amazon Web Services (AWS) as a platform. We will take the perspective of a new startup company spinning up infrastructure in AWS for […]
Register: https://www.antisyphontraining.com/professionally-evil-cissp-mentorship-program/ ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of […]
AASLR will have infosec professionals sharing their knowledge on tools, techniques, and procedures and then answering a lot of your questions on everything you can think to ask. Streamed live […]
Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ Are you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? […]
For most security teams, high operational tempo (measured in dumpster fire lumens) incentivizes analysts to stick to well-tailored playbooks that prioritize remediation at the expense of proper incident scoping and […]
Register: https://www.antisyphontraining.com/advanced-network-threat-hunting-w-chris-brenton/ So far we’ve had over 21,000 students attend our one-day network threat hunting course. Many have asked that we provide an extended class with more hands-on lab time. That is […]
