BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Black Hills Information Security, Inc. - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Black Hills Information Security, Inc.
X-ORIGINAL-URL:https://www.blackhillsinfosec.com
X-WR-CALDESC:Events for Black Hills Information Security, Inc.
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230328T120000
DTEND;TZID=America/New_York:20230328T160000
DTSTAMP:20260404T071930
CREATED:20220628T203522Z
LAST-MODIFIED:20230515T211629Z
UID:10000616-1680004800-1680019200@www.blackhillsinfosec.com
SUMMARY:SOC Core Skills w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/soc-core-skills-w-john-strand/ \nThis 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have. \n\n\n 
URL:https://www.blackhillsinfosec.com/event/soc-core-skills-w-john-strand/2023-03-28/
LOCATION:TN
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/SOC_CoreSkills_1920x1080.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230328T110000
DTEND;TZID=America/New_York:20230328T160000
DTSTAMP:20260404T071930
CREATED:20220920T180353Z
LAST-MODIFIED:20230209T222159Z
UID:10000922-1680001200-1680019200@www.blackhillsinfosec.com
SUMMARY:Red Team Fundamentals for Active Directory w/ Eric Kuehn
DESCRIPTION:Register: https://www.antisyphontraining.com/red-team-fundamentals-for-active-directory/ \nThe Red Team Fundamentals for Active Directory course is an 8-hour class focused on explaining the fundamentals of Active Directory and how different aspects can be exploited when performing penetration tests. The goal is not only to cover different attacks but also explain the details of why they work and how an environment can be made resilient to them and potentially detect malicious activity. This combination opens the course to those looking to hone their offensive skills as well as those who are protecting an enterprise network. \nThe course mixes lecture with a number of hands-on exercises to reinforce the information and techniques. The activities will cover ways to examine an Active Directory environment\, looking for a variety of misconfigurations that are commonly seen in Active Directory implementations (even by some security-conscious entities)\, and then exploit these issues to pivot and escalate our access. Ultimately\, the students will gain full control of an AD Forest. \nWhile in class\, students will be provided access to a lab containing realistic targets and tools to learn both the attacks and defenses of Active Directory. This environment enables the attendees to understand how the covered techniques are used in the real world.
URL:https://www.blackhillsinfosec.com/event/red-team-fundamentals-for-active-directory-w-eric-kuehn-2/2023-03-28/
LOCATION:TN
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Red_Team_Fundamentals_for_Active_Directory-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230327T163000
DTEND;TZID=America/New_York:20230327T173000
DTSTAMP:20260404T071930
CREATED:20220624T174740Z
LAST-MODIFIED:20220627T143602Z
UID:10000431-1679934600-1679938200@www.blackhillsinfosec.com
SUMMARY:BHIS | Talkin' Bout Infosec News
DESCRIPTION:Join the BHIS team as we talk about current infosec news. \nStreamed live every Monday @ 4:30 pm. \nhttps://www.youtube.com/BlackHillsInformationSecurity
URL:https://www.blackhillsinfosec.com/event/bhis-talkin-bout-infosec-news/2023-03-27/
LOCATION:TN
CATEGORIES:Newscast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/MicrosoftTeams-image-10.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230327T110000
DTEND;TZID=America/New_York:20230327T160000
DTSTAMP:20260404T071930
CREATED:20220628T203522Z
LAST-MODIFIED:20230515T211629Z
UID:10000615-1679914800-1679932800@www.blackhillsinfosec.com
SUMMARY:SOC Core Skills w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/soc-core-skills-w-john-strand/ \nThis 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have. \n\n\n 
URL:https://www.blackhillsinfosec.com/event/soc-core-skills-w-john-strand/2023-03-27/
LOCATION:TN
CATEGORIES:Pay What You Can,Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/SOC_CoreSkills_1920x1080.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230323T130000
DTEND;TZID=America/New_York:20230323T140000
DTSTAMP:20260404T071930
CREATED:20230324T002747Z
LAST-MODIFIED:20230327T215412Z
UID:10000950-1679576400-1679580000@www.blackhillsinfosec.com
SUMMARY:BHIS Webcast: Attack Surface Management 101 w/ Ashley Knowles
DESCRIPTION:Register: \nhttps://zoom.us/webinar/register/WN_-DCeQRWpTeqhZaccVeB66w \nWhy does every organization\, regardless of size\, need a form of Attack Surface Management (ASM)? Every day there are more and more cyber security attacks on organizations across the globe that have folks scratching their heads wondering how to identify and remediate these potential attack vectors. Enter ASM\, where the aim is to identify and protect critical IT infrastructure and digital assets. \nIn this BHIS webcast\, Ashley will cover real-world examples and participants will gain a better understanding of the impact of not having proper ASM practices in place.
URL:https://www.blackhillsinfosec.com/event/bhis-webcast-attack-surface-management-101-w-ashley-knowles/
LOCATION:TN
CATEGORIES:BHIS Webcast
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2023/03/Attack-Surface-Management.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230322T163000
DTEND;TZID=America/New_York:20230322T173000
DTSTAMP:20260404T071930
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000529-1679502600-1679506200@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2023-03-22/
LOCATION:TN
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230321T163000
DTEND;TZID=America/New_York:20230321T173000
DTSTAMP:20260404T071930
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000528-1679416200-1679419800@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2023-03-21/
LOCATION:TN
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230320T163000
DTEND;TZID=America/New_York:20230320T173000
DTSTAMP:20260404T071930
CREATED:20220624T174740Z
LAST-MODIFIED:20220627T143602Z
UID:10000430-1679329800-1679333400@www.blackhillsinfosec.com
SUMMARY:BHIS | Talkin' Bout Infosec News
DESCRIPTION:Join the BHIS team as we talk about current infosec news. \nStreamed live every Monday @ 4:30 pm. \nhttps://www.youtube.com/BlackHillsInformationSecurity
URL:https://www.blackhillsinfosec.com/event/bhis-talkin-bout-infosec-news/2023-03-20/
LOCATION:TN
CATEGORIES:Newscast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/MicrosoftTeams-image-10.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230318T080000
DTEND;TZID=America/New_York:20230318T170000
DTSTAMP:20260404T071930
CREATED:20230206T231216Z
LAST-MODIFIED:20230206T231216Z
UID:10000781-1679126400-1679158800@www.blackhillsinfosec.com
SUMMARY:BSides Rochester
DESCRIPTION:
URL:https://www.blackhillsinfosec.com/event/bsides-rochester/
LOCATION:TN
CATEGORIES:Conference
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2023/02/2019_logo.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230316T080000
DTEND;TZID=America/New_York:20230318T170000
DTSTAMP:20260404T071930
CREATED:20221206T215638Z
LAST-MODIFIED:20221206T215638Z
UID:10000779-1678953600-1679158800@www.blackhillsinfosec.com
SUMMARY:WiCyS (Women in CyberSecurity)
DESCRIPTION:
URL:https://www.blackhillsinfosec.com/event/wicys-women-in-cybersecurity/
LOCATION:TN
CATEGORIES:Conference
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/12/wicys.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230315T163000
DTEND;TZID=America/New_York:20230315T173000
DTSTAMP:20260404T071930
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000527-1678897800-1678901400@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2023-03-15/
LOCATION:TN
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230315T120000
DTEND;TZID=America/New_York:20230315T160000
DTSTAMP:20260404T071930
CREATED:20230209T221954Z
LAST-MODIFIED:20230209T221954Z
UID:10000921-1678881600-1678896000@www.blackhillsinfosec.com
SUMMARY:Foundational Data Protection Training (FDPT)
DESCRIPTION:Register: https://www.antisyphontraining.com/foundational-data-protection-training \nThis foundational course is designed to provide the basic tools needed to protect the data that is most valuable to your business. Since data is an integral part of an organization’s core operations\, it’s important to build a solid foundation for understanding the considerations and mechanisms related to data protection. \nThe protection of sensitive data is paramount for information security professionals. The course is intended to help provide the techniques and tools needed to conduct a self-assessment of your data protection program. This helps ensure that your limited resources are being dedicated to the places within your security program needing the most attention\, and based on corporate goals\, needs\, and regulatory compliance requirements.
URL:https://www.blackhillsinfosec.com/event/foundational-data-protection-training-fdpt/2023-03-15/
LOCATION:TN
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2023/02/Foundational-Data-Protection-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230314T163000
DTEND;TZID=America/New_York:20230314T173000
DTSTAMP:20260404T071930
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000526-1678811400-1678815000@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2023-03-14/
LOCATION:TN
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230314T110000
DTEND;TZID=America/New_York:20230314T160000
DTSTAMP:20260404T071930
CREATED:20230209T221954Z
LAST-MODIFIED:20230209T221954Z
UID:10000920-1678791600-1678809600@www.blackhillsinfosec.com
SUMMARY:Foundational Data Protection Training (FDPT)
DESCRIPTION:Register: https://www.antisyphontraining.com/foundational-data-protection-training \nThis foundational course is designed to provide the basic tools needed to protect the data that is most valuable to your business. Since data is an integral part of an organization’s core operations\, it’s important to build a solid foundation for understanding the considerations and mechanisms related to data protection. \nThe protection of sensitive data is paramount for information security professionals. The course is intended to help provide the techniques and tools needed to conduct a self-assessment of your data protection program. This helps ensure that your limited resources are being dedicated to the places within your security program needing the most attention\, and based on corporate goals\, needs\, and regulatory compliance requirements.
URL:https://www.blackhillsinfosec.com/event/foundational-data-protection-training-fdpt/2023-03-14/
LOCATION:TN
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2023/02/Foundational-Data-Protection-.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230313T163000
DTEND;TZID=America/New_York:20230313T173000
DTSTAMP:20260404T071930
CREATED:20220624T174740Z
LAST-MODIFIED:20220627T143602Z
UID:10000429-1678725000-1678728600@www.blackhillsinfosec.com
SUMMARY:BHIS | Talkin' Bout Infosec News
DESCRIPTION:Join the BHIS team as we talk about current infosec news. \nStreamed live every Monday @ 4:30 pm. \nhttps://www.youtube.com/BlackHillsInformationSecurity
URL:https://www.blackhillsinfosec.com/event/bhis-talkin-bout-infosec-news/2023-03-13/
LOCATION:TN
CATEGORIES:Newscast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/MicrosoftTeams-image-10.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230308T163000
DTEND;TZID=America/New_York:20230308T173000
DTSTAMP:20260404T071930
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000525-1678293000-1678296600@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2023-03-08/
LOCATION:TN
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230307T163000
DTEND;TZID=America/New_York:20230307T173000
DTSTAMP:20260404T071930
CREATED:20220624T204221Z
LAST-MODIFIED:20220920T184909Z
UID:10000524-1678206600-1678210200@www.blackhillsinfosec.com
SUMMARY:AASLR: Antisyphon Address Space Layout Randomization
DESCRIPTION:AASLR will have infosec professionals sharing their knowledge on tools\, techniques\, and procedures and then answering a lot of your questions on everything you can think to ask. \nStreamed live every Tuesday and Wednesday @ 4:30 pm. \nhttps://www.twitch.tv/antisyphon
URL:https://www.blackhillsinfosec.com/event/aaslr-antisyphon-address-space-layout-randomization/2023-03-07/
LOCATION:TN
CATEGORIES:Livestream
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/antisyphon_livestream_v1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230306T163000
DTEND;TZID=America/New_York:20230306T173000
DTSTAMP:20260404T071930
CREATED:20220624T174740Z
LAST-MODIFIED:20220627T143602Z
UID:10000428-1678120200-1678123800@www.blackhillsinfosec.com
SUMMARY:BHIS | Talkin' Bout Infosec News
DESCRIPTION:Join the BHIS team as we talk about current infosec news. \nStreamed live every Monday @ 4:30 pm. \nhttps://www.youtube.com/BlackHillsInformationSecurity
URL:https://www.blackhillsinfosec.com/event/bhis-talkin-bout-infosec-news/2023-03-06/
LOCATION:TN
CATEGORIES:Newscast
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/MicrosoftTeams-image-10.jpg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230303T100000
DTEND;TZID=America/New_York:20230303T180000
DTSTAMP:20260404T071930
CREATED:20230209T220045Z
LAST-MODIFIED:20230209T220405Z
UID:10000913-1677837600-1677866400@www.blackhillsinfosec.com
SUMMARY:PowerShell for InfoSec: What You Need to Know! w/ Carrie Roberts
DESCRIPTION:Register: https://www.antisyphontraining.com/powershell-for-infosec-what-you-need-to-know/ \nPowerShell is an excellent cross-platform shell for executing commands and scripts on both local and remote machines. It is installed on Windows by default and is widely used by both network defenders and attackers. This course will cover key PowerShell concepts that both blue and red teamers should understand including logging\, credential management\, remote administration\, security bypass techniques\, and popular PowerShell attack tools.
URL:https://www.blackhillsinfosec.com/event/powershell-for-infosec-what-you-need-to-know-w-carrie-roberts/2023-03-03/
LOCATION:TN
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2023/02/PowerShell-for-Infosec.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230303T100000
DTEND;TZID=America/New_York:20230303T180000
DTSTAMP:20260404T071931
CREATED:20230209T191713Z
LAST-MODIFIED:20230209T191713Z
UID:10000899-1677837600-1677866400@www.blackhillsinfosec.com
SUMMARY:Introduction to Python w/ Joff Thyer
DESCRIPTION:Register: https://www.antisyphontraining.com/introduction-to-python/ \nOne of the most pressing needs Information Security professionals face today is the need to automate their work in both the attack\, and defense context. Skills gained for automating tasks in programming languages are critical to scale up the efforts of a limited security professional talent pool.\nFor example\, it is not uncommon to find useful Python scripts on the Internet that are at a Proof-of-Concept stage to quickly achieve some information security professional goal. Penetration testers\, incident responders\, forensics\, and defense professionals need the ability to be able to take existing code and produce stable functional Python tools or be able to debug an issue with an existing tool. \nThis course aims to teach the fundamentals of the Python programming language such that a student will gain a beginning to intermediate level of competency with the language. Labs will be presented in a Capture the Flag (CTF) style format as well as some more comprehensive programming tasks. \nThe expectation as to whether students can complete all exercises is dependent on prior student experience\, and knowledge. Python is a language that is best approached if a student has some elementary programming background (such as shell scripting for example).
URL:https://www.blackhillsinfosec.com/event/introduction-to-python-w-joff-thyer/2023-03-03/
LOCATION:TN
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2023/02/Introduction-to-Python.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230303T100000
DTEND;TZID=America/New_York:20230303T180000
DTSTAMP:20260404T071931
CREATED:20230209T163611Z
LAST-MODIFIED:20230209T165613Z
UID:10000786-1677837600-1677866400@www.blackhillsinfosec.com
SUMMARY:Advanced Endpoint Investigations w/ Jake Williams
DESCRIPTION:For most security teams\, high operational tempo (measured in dumpster fire lumens) incentivizes analysts to stick to well-tailored playbooks that prioritize remediation at the expense of proper incident scoping and root cause analysis. Though modern endpoint security products have significantly improved host visibility\, most critical incidents will require the acquisition and analysis of additional endpoint data. This course focuses on four core investigative competencies: endpoint data collection\, investigative triage\, incident response pivots\, and root cause analysis. \nAfter learning about key endpoint artifact and memory analysis techniques for Windows and Linux\, attendees will work through real-world scenarios in hands-on labs. We’ll pivot from initial detection into host triage analysis to discern attackers’ discovery\, defense evasion and lateral movement techniques. Attendees will learn to identify key indicators for the generation of high-fidelity detections. \n\n\n\nhttps://www.antisyphontraining.com/advanced-endpoint-investigations/
URL:https://www.blackhillsinfosec.com/event/advanced-endpoint-investigations/2023-03-03/
LOCATION:TN
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/07/advanced_endpoints.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230303T100000
DTEND;TZID=America/New_York:20230303T180000
DTSTAMP:20260404T071931
CREATED:20221206T211109Z
LAST-MODIFIED:20230209T190439Z
UID:10000897-1677837600-1677866400@www.blackhillsinfosec.com
SUMMARY:Introduction to Pentesting w/ John Strand
DESCRIPTION:Register: https://www.antisyphontraining.com/introduction-to-pentesting/ \nAre you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements\, operational phases\, and a constant flood of new vulnerabilities hitting the industry\, the journey into penetration testing can quickly become confusing. \nIn this training course\, we will examine the different types of penetration testing engagements and take a deep dive into establishing a repeatable testing methodology for executing quality tests. We will look at some tools of the trade to understand what they are doing under the hood\, identify what separates a great finding from a good finding in reports\, and really zero in on establishing your own methodology! \nBy the end of the training\, you can expect to leave with a firm understanding of how pentests are executed and a newfound comfortability performing penetration tests. We will also provide numerous resources and tools that will help you pave your way into a pentesting career!
URL:https://www.blackhillsinfosec.com/event/introduction-to-pentesting-w-john-strand-2/2023-03-03/
LOCATION:TN
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/12/Introduction-to-Pentesting-1536x860-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230303T100000
DTEND;TZID=America/New_York:20230303T180000
DTSTAMP:20260404T071931
CREATED:20220920T172402Z
LAST-MODIFIED:20230209T215643Z
UID:10000909-1677837600-1677866400@www.blackhillsinfosec.com
SUMMARY:Network Forensics and Incident Response w/ Troy Wojewoda
DESCRIPTION:Register: https://www.antisyphontraining.com/network-forensics-and-detection-w-troy-wojewoda/ \nIncident responders are continually faced with the challenge of collecting and analyzing relevant event data—network communications is no exception. This course uses an assortment of network data acquisition tools and techniques with a focus on open-source\, vendor-neutral solutions. Students who take this course will learn how to perform network traffic and protocol analysis that ultimately supports cybersecurity incident response efforts. From reconnaissance to data exfiltration\, network traffic scales to provide a bird’s-eye view of attacker activity. Leveraging the vantage point of key network traffic chokepoints\, this course explores nearly every phase of an attacker’s methodology. Students will learn network traffic analysis concepts and work through hands-on lab exercises that reinforce the course material using real-world attack scenarios.
URL:https://www.blackhillsinfosec.com/event/network-forensics-and-incident-response-w-troy-wojewoda/2023-03-03/
LOCATION:TN
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Network-Forensics-Incident-Response-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230303T100000
DTEND;TZID=America/New_York:20230303T180000
DTSTAMP:20260404T071931
CREATED:20220920T172139Z
LAST-MODIFIED:20230209T195843Z
UID:10000907-1677837600-1677866400@www.blackhillsinfosec.com
SUMMARY:Modern WebApp Pentesting w/ BB King
DESCRIPTION:Register: https://www.antisyphontraining.com/modern-webapp-pentesting-w-bb-king/ \nModern Webapp Pentesting is unique in its approach to testing webapps. Too many courses are built around the assumption that a webapp pentester’s skills should grow along a straight line\, starting with something like the OWASP Top Ten and culminating in something like Attacking Web Cryptography. Real webapps don’t follow that same path\, and neither should real webapp pentesters. Attacking Web Sockets is not more difficult than attacking HTTP traffic\, it’s just different. Web APIs are not something you’re qualified to test only after you’ve put your time in on traditional webapps … they’re just different. \nThis course doesn’t worry about where a student falls on the imaginary scale of beginner to expert but instead focuses on finding and exploiting the kinds of issues found in real webapps today\, based on the instructor’s many years of ongoing experience in testing … real webapps today.
URL:https://www.blackhillsinfosec.com/event/modern-webapp-pentesting-w-bb-king-2/2023-03-03/
LOCATION:TN
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/modern-webapp-pentesting-graphic-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230303T100000
DTEND;TZID=America/New_York:20230303T180000
DTSTAMP:20260404T071931
CREATED:20220920T171541Z
LAST-MODIFIED:20230209T215840Z
UID:10000911-1677837600-1677866400@www.blackhillsinfosec.com
SUMMARY:Offensive Development w/ Greg Hatcher & John Stigerwalt
DESCRIPTION:Register: https://www.antisyphontraining.com/offensive-development-w-greg-hatcher-john-stigerwalt/ \nDive deep into cutting edge techniques that bypass or neuter modern endpoint defenses. Learn how these solutions work to mitigate their utility and hide deep within code on the endpoint. The days of downloading that binary from the internet and pointing it at a remote machine are over. Today’s defenses oftentimes call for multiple bypasses within a single piece of code. \nThis course is designed to take you deep into defensive and offensive tooling – an apex attacker must know the own indicators of compromise (IOCs) they’re creating and the artifacts they’re\nleaving behind.
URL:https://www.blackhillsinfosec.com/event/offensive-development-w-greg-hatcher-john-stigerwalt-2/2023-03-03/
LOCATION:TN
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Offensive-Development-1536x864-1.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230303T100000
DTEND;TZID=America/New_York:20230303T180000
DTSTAMP:20260404T071931
CREATED:20220822T231754Z
LAST-MODIFIED:20230209T184158Z
UID:10000792-1677837600-1677866400@www.blackhillsinfosec.com
SUMMARY:Enterprise Attack Initial Access w/ Steve Borosh
DESCRIPTION:Register: https://www.antisyphontraining.com/enterprise-attack-initial-access-w-steve-borosh/ \nEnterprises have been working tirelessly to improve their security postures through defense-in-depth approaches. Offensive teams have also been putting in long hours of research into bypassing the latest EDR’s and defensive products that keep them on their toes. Long gone “hopefully” are the days of hurdling an HTA file laced with a download cradle at a mature organization with a “Free iPad” ruse and watching your screen fill with incoming agents. \nAn offense-in-depth approach may be applied to offensive practitioners looking for success against organizations well-versed in defending a large enterprise. Today’s organizations have assets in multiple geo regions\, networks\, cloud services\, border hosts\, and many of them are tied to the internal network in some way.\nThis course aims to help offensive practitioners successfully exercise their client environments from a multi-faceted approach using the latest TTPs blended with esoteric practices to gain the upper hand on your assessments.
URL:https://www.blackhillsinfosec.com/event/enterprise-attack-initial-access-w-steve-borosh-2/2023-03-03/
LOCATION:TN
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/Enterprise-Attack-Initial-Access.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230303T100000
DTEND;TZID=America/New_York:20230303T180000
DTSTAMP:20260404T071931
CREATED:20220822T230850Z
LAST-MODIFIED:20230209T184019Z
UID:10000790-1677837600-1677866400@www.blackhillsinfosec.com
SUMMARY:Breaching the Cloud w/ Beau Bullock
DESCRIPTION:Register: https://www.antisyphontraining.com/breaching-the-cloud-w-beau-bullock/ \nDo you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services\, Microsoft Azure\, and Google Cloud Platform. In this training course\, hacking concepts will be introduced for each of those services. \nThis training walks through a complete penetration testing methodology of cloud-based infrastructure. Starting with no information other than the company name you will learn to discover what cloud-specific assets your target is using. Following the enumeration of cloud services\, you will learn how to discover misconfigurations that commonly expose sensitive data as well as a thorough understanding of how to get an initial foothold into a cloud-based organization. \nPost-compromise techniques of cloud infrastructure differ from the techniques used in typical on-premise environments. You will learn situational awareness techniques that ultimately will impact how you will escalate privileges in the cloud. With most cloud-based authentication being publicly exposed this presents new and interesting persistence techniques that are non-existent to on-premise environments. With productivity tools like G-Suite and Microsoft 365 many organizations are making their email and other data that is normally protected by a firewall available to remote employees. You will learn how to discover\, pillage\, and exfiltrate data from these services. \nMany organizations are fully leveraging cloud services for their production infrastructure. This can include web servers\, SQL databases\, storage\, virtual machines\, and more. In this training\, you will learn how to assess and compromise these resources. Some cloud deployments are directly connected to on-premise environments via VPN. This presents an opportunity to pivot access from cloud to on-prem or vice-versa. \nFinally\, in this training\, we will not only be attacking cloud infrastructure but also leveraging it for red team operations. You will learn techniques that leverage cloud services for techniques such as phishing\, domain fronting\, and command & control. \nTools and techniques used on real-world penetration tests against cloud assets will be shared including hands-on demonstrations. At the end of this training\, you will have new skills for assessing cloud-based infrastructure!
URL:https://www.blackhillsinfosec.com/event/breaching-the-cloud-w-beau-bullock-2/2023-03-03/
LOCATION:TN
CATEGORIES:Training
ATTACH;FMTTYPE=image/jpeg:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/BreachingCloud_1920x1080-1-1536x864-1.jpeg
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230303T100000
DTEND;TZID=America/New_York:20230303T180000
DTSTAMP:20260404T071931
CREATED:20220822T230555Z
LAST-MODIFIED:20230209T183606Z
UID:10000788-1677837600-1677866400@www.blackhillsinfosec.com
SUMMARY:Advanced Network Threat Hunting w/ Chris Brenton
DESCRIPTION:Register: https://www.antisyphontraining.com/advanced-network-threat-hunting-w-chris-brenton/ \nSo far we’ve had over 21\,000 students attend our one-day network threat hunting course. Many have asked that we provide an extended class with more hands-on lab time. That is exactly what we have rolled into this 16-hour course! \nWe will spend most of this class analyzing pcap files for Command and Control (C2) communications in order to identify malware back channels. It is assumed that the student will already understand the basics of network threat hunting\, so we can immediately jump into applying that knowledge. The goal will be to create a threat hunting runbook that you can use within your own organization in order to identify systems that have been compromised.
URL:https://www.blackhillsinfosec.com/event/advanced-network-threat-hunting-w-chris-brenton/2023-03-03/
LOCATION:TN
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/Adv-Network-Threat-Hunting-Training-Graphics.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230303T100000
DTEND;TZID=America/New_York:20230303T180000
DTSTAMP:20260404T071931
CREATED:20220822T224537Z
LAST-MODIFIED:20230209T184948Z
UID:10000887-1677837600-1677866400@www.blackhillsinfosec.com
SUMMARY:How to be Irresistible to Hiring Managers w/ Kip Boyle
DESCRIPTION:Register: https://www.antisyphontraining.com/how-to-be-irresistible-to-hiring-managers/ \nAre you spending hours a day trawling through the online job sites and spending even more time filling out lengthy application forms with nothing to show for it? Something’s not working\, but what could it be? Kip Boyle\, a veteran hiring manager who has personally interviewed hundreds of job applicants as well as hired dozens of successful cybersecurity candidates\, will teach you to think like a hiring manager and bend the hiring process to your advantage. After you taking this class\, you’ll understand how to ace your resume\, crush your interviews\, and negotiate your ideal salary.
URL:https://www.blackhillsinfosec.com/event/how-to-be-irresistible-to-hiring-managers-w-kip-boyle/2023-03-03/
LOCATION:TN
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/08/How_to_be_Irresistible_to_Hiring_Managers_.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230303T100000
DTEND;TZID=America/New_York:20230303T180000
DTSTAMP:20260404T071931
CREATED:20220628T210910Z
LAST-MODIFIED:20230209T195723Z
UID:10000905-1677837600-1677866400@www.blackhillsinfosec.com
SUMMARY:Linux Command-Line Dojo w/ Hal Pomeranz
DESCRIPTION:Register: https://www.antisyphontraining.com/linux-command-line-dojo-w-hal-pomeranz/ \nThe DevOps folks are pushing Linux\, your red-team friends are doing serious damage with Linux-based tools\, and the Linux users on your Incident Response team are doing mysteriously powerful things. You’re ready to see if some of the Linux magic can rub off on you\, but you don’t know where to start. \nThis 16-hour course is a quick jumpstart on the Linux command-line. Start from the basics and work all the way up to command-line programming. Short learning modules and lots of practical hands-on activities will put you on the road to Linux command-line mastery. And electronic copies of everything are yours to take home\, so you can continue the learning even after class is over.
URL:https://www.blackhillsinfosec.com/event/linux-command-line-dojo-w-hal-pomeranz/2023-03-03/
LOCATION:TN
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://www.blackhillsinfosec.com/wp-content/uploads/2022/06/Linux-Command-Line-Dojo-1536x864-1.png
END:VEVENT
END:VCALENDAR