BHIS | Talkin’ Bout Infosec News
Join the BHIS team as we talk about current infosec news. Streamed live every Monday @ 4:30 pm. https://www.youtube.com/BlackHillsInformationSecurity
Join the BHIS team as we talk about current infosec news. Streamed live every Monday @ 4:30 pm. https://www.youtube.com/BlackHillsInformationSecurity
Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ Are you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working, but what could it be? Kip Boyle, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as […]
For most security teams, high operational tempo (measured in dumpster fire lumens) incentivizes analysts to stick to well-tailored playbooks that prioritize remediation at the expense of proper incident scoping and root cause analysis. Though modern endpoint security products have significantly improved host visibility, most critical incidents will require the acquisition and analysis of additional endpoint […]
Register: https://www.antisyphontraining.com/advanced-network-threat-hunting-w-chris-brenton/ So far we’ve had over 21,000 students attend our one-day network threat hunting course. Many have asked that we provide an extended class with more hands-on lab time. That is exactly what we have rolled into this 16-hour course! We will spend most of this class analyzing pcap files for Command and Control (C2) communications […]
Register: https://www.antisyphontraining.com/breaching-the-cloud-w-beau-bullock/ Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. In this training course, hacking concepts will be introduced for each of those services. This training walks through […]
Register: https://www.antisyphontraining.com/defending-the-enterprise-w-kent-ickler-and-jordan-drysdale/ For the luckiest of enterprises, the awareness of an insecure environment is proven not in public discord after a breach but instead by effective security penetration tests. Time and time again Jordan and Kent have witnessed organizations struggle with network management, Active Directory, organizational change, and an increasingly experienced adversary. For new and […]
Register: https://www.antisyphontraining.com/enterprise-attack-initial-access-w-steve-borosh/ Enterprises have been working tirelessly to improve their security postures through defense-in-depth approaches. Offensive teams have also been putting in long hours of research into bypassing the latest EDR’s and defensive products that keep them on their toes. Long gone “hopefully” are the days of hurdling an HTA file laced with a download […]
Register: https://www.antisyphontraining.com/hiring-handbook-how-to-build-an-infosec-team-that-gets-stuff-done-w-kip-boyle/ In this class, Kip shows InfoSec supervisors how to build the team of their dreams. Students will learn how to attract and retain top tier talent. The kind of talented people who could work anywhere, but choose to work with you. Team members who get stuff done and don’t think much about changing […]
Register: https://wildwesthackinfest.com/antisyphon/introduction-to-iot-device-hacking-w-rick-wisser-and-david-fletcher/ With over 21.5 billion interconnected devices in the world and a future estimate of 6.2 trillion devices by 2025, understanding and learning how to methodologically assess those devices is sure to be a valuable skill. “Introduction to IOT Device Hacking” will present a methodological approach for understanding attack surfaces, interacting with various protocols […]
Are you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements, operational phases, and a constant flood of new vulnerabilities hitting the industry, the journey into penetration testing can quickly become confusing. In this training course, we will examine the […]
Register: https://www.antisyphontraining.com/linux-forensics-w-hal-pomeranz/ Linux is everywhere– running in the cloud, on cell phones, and in embedded devices that make up the “Internet of Things”. Often neglected by their owners, vulnerable Linux systems are low-hanging fruit for attackers wishing to create powerful botnets or mine cryptocurrencies. Ransomware-type attacks may target Linux-based database systems and other important infrastructure. […]
Register: https://www.antisyphontraining.com/offensive-development-w-greg-hatcher-john-stigerwalt/ Dive deep into cutting edge techniques that bypass or neuter modern endpoint defenses. Learn how these solutions work to mitigate their utility and hide deep within code on the endpoint. The days of downloading that binary from the internet and pointing it at a remote machine are over. Today’s defenses oftentimes call for […]
