2-Day Training Opportunities
Introduction to Red Team OperationsTraining by Millennium
Presenter: Nicholas Downer, Systems Security Engineer/Instructor
Understanding how our adversaries accomplish high-profile attacks is the cornerstone of this course. This course is based on Millennium Corporation’s 5 day “Red Team Apprentice Course” and covers realistic attack tactics and techniques that can be found in open source, industry threat reports. Topics include: NMAP enumeration techniques, phishing campaigns, Microsoft windows enumeration, Microsoft active directory enumeration, basic privilege escalation techniques, and compromising a Microsoft domain controller.
1-Day Training Opportunities
RMF Automation using PowerShell and Bash Scripts - ISSM and ISSO Training - NIST 800-53a v4Training by CyberProtex
Presenter: Ben McGee, CyberProtex, Founder, President and Chief Executive Officer
The one day workshop will provide insight and understanding to the major roles associated with the Risk Management Framework (RMF) process, focusing on the Information System Security Manager (ISSM) and the Information System Security Officer (ISSO) positions. Participants will experience hands-on labs learning PowerShell and Bash Scripts to automate and mitigate controls. Skills learned will be focused to provide support to DOD computing environments, to adhere to NISPOM Chapter 8 and DAAPM policies, to comply with Security Content Automation Protocol (SCAP) and STIGs, and to properly decipher communications with eMASS. Training will be hands-on so bring your laptop.
Threat Hunting using Open Source ToolsTraining by CyberProtex
Presenter: Rita Edwards, CyberProtex, Featured Cyber Security Instructor
This hands-on course addresses all the stages involved in the Threat Hunting and Intelligence Gathering landscape. Our course focuses on teaching professionals how to identify and counteract risks to the business by finding threats and mitigating them. It is a comprehensive, hands-on course that teaches a detailed approach for building an effective threat hunting program within an organization which is professional, systematic and repeatable. This course is for anyone currently in a role as a cybersecurity engineer, test engineer, systems engineer or software engineer who is looking to sharpen their skill-set arsenal.
This workshop is also great for someone starting out in cyber security as it will increase employability by learning industry tools and techniques used in the Cyber Threat Hunting and Intelligence Gathering industry.
Threat Hunting with SuricataTraining by OISF
Presenters: Peter Manev, Director of Training, Open Information Security Foundation & Dr. Joshua Stroschein, Training and Academic Outreach, Open Information Security Foundation
Defending your network starts with understanding your traffic. More than just an IDS/IPS, Suricata can provide the visibility to solve incidents quickly and more accurately by providing context before, during, and after an alert. In this brand new 1-day class, we teach the skills required by network defenders to gain a deeper understanding of their networks to identify, respond and protect against threats.