Exclusive Trainings by Antisyphon and Black Hills

All trainings and activities will be presented in English


The exclusive trainings will take place two days before the BSides Event at the same venue on September 12th and 13th from 9h to 17h.

To participate in one of the exclusive trainings you must register here

Registering to the trainings give you automatic access (ticket) to the BSides Conference

Day 1 - Thursday, September 12th

ID
Time
Training
Instructor
0 12/09 09:00 AM - 17:00 PM Offensive Operations Against Foreign Adversaries: Russia
What if you were part of a State-sponsored hacking group, tasked with gaining access to a Russian defense contractor network? What high-value targets could you identify from an external, unauthenticated perspective using advanced OSINT techniques? How would you gain an initial foothold on an operating system that uses a foreign language? Can you enumerate compromised systems with your current tooling and operate in a new software ecosystem devoid of traditional Active Directory? What valuable information could you find and exfiltrate to achieve mission success? In the end, do you profit from your access or burn it all to the ground? Join us as we take you on a journey as a State-sponsored hacker pivoting through Russian defense networks. Register now
Steve Borosh started hacking the planet with Black Hills Information Security in 2021 and has been instructing offensive courses since 2015. Steve has instructed at conferences such as BlackHat and Wild West Hackin' Fest, for Fortune 500 companies, and for federal law enforcement. He currently annoys system administrators as part of the ANTISOC team at BHIS and enjoys releasing shock-and-awe research blogs and open-source tools to drive change in the industry.
1 12/09 09:00 AM - 17:00 PM SOC Core Skills w/ John Strand
16-hour course
Includes Certificate of participation and 6 months access to the course on-demand
This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have.
  • Getting Started
  • TCP/IP
  • Headers
  • Shodan
  • TCPDump
  • Wireshark
  • Linux
  • Users and Privileges
  • Root
  • Home Directories and Hidden Files
  • Mkdir
  • Vi
  • Nano
  • Ps aux
  • Top
  • Ping
  • Nmap
  • Netstat
  • Bash History
  • Linux CLI
  • Windows Endpoint Analysis
  • PowerShell
  • DeepBlueCLI
  • DeepWhiteCLI
  • Server Analysis
  • CIS Benchmarks
  • Memory Forensics
  • Volatility
  • MITRE and UEBA
  • User Entity Behavior Analytics
  • JPCert Tools Analysis
  • False Positives
  • Lateral Movement
  • Logs
  • SIEM and %
  • GPO and Sysmon
Register now
John Strand has consulted and taught thousands of classes and hundreds of organizations in the areas of security, regulatory compliance, and penetration testing. He is a coveted speaker and much-loved former SANS instructor and course author. John is a contributor to the industry shaping Penetration Testing Execution Standard and 20 Critical Security Controls frameworks.
In 2008, John founded Black Hills Information Security (BHIS), a pentesting company that strives to understand its clients from a holistic perspective, emphasizing collaboration and education over stunt hacking. Since then, BHIS has grown to become a “tribe of companies” that includes Antisyphon Infosec Training, Active Countermeasures (ACM), Wild West Hackin’ Fest (WWHF), and more!
2 12/09 09:00 AM - 17:00 PM Introduction to Python w/ Joff Thyer
16-hour course
Includes Certificate of participation and 6 months access to the course on-demand
One of the most pressing needs Information Security professionals face today is the need to automate their work in both the attack, and defense context. Skills gained for automating tasks in programming languages are critical to scale up the efforts of a limited security professional talent pool. For example, it is not uncommon to find useful Python scripts on the Internet that are at a Proof-of-Concept stage to quickly achieve some information security professional goal. Penetration testers, incident responders, forensics, and defense professionals need the ability to be able to take existing code and produce stable functional Python tools or be able to debug an issue with an existing tool. This course aims to teach the fundamentals of the Python programming language such that a student will gain a beginning to intermediate level of competency with the language. Labs will be presented in a Capture the Flag (CTF) style format as well as some more comprehensive programming tasks.The expectation as to whether students can complete all exercises is dependent on prior student experience, and knowledge. Python is a language that is best approached if a student has some elementary programming background (such as shell scripting for example).
  • About Python
  • Python Shell
  • Strings, Input, Output
  • Writing your First Script
  • Code Blocks, Indentation
  • Functions
  • Conditional Logic
  • Lists
  • Loops
  • Modules
  • Dictionaries
  • Files and Databases
  • File Handling
  • Requests
  • Classes
  • Exception Handling
  • Regular Expressions
  • Furthering your Journey
Register now
Joff Thyer has been a penetration tester and security analyst with Black Hills Information Security since 2013. Prior to joining the InfoSec world, he had a long career in the IT industry as a systems administrator and an enterprise network architect. He has an Associate’s in Computer Science, a B.S. in Mathematics, and an M.S. in Computer Science, as well as several certifications. The best part of a penetration test for Joff is developing sophisticated malware that tackles defensive solutions, ultimately delivering exciting wins for company engagements. He has extensive experience covering intrusion prevention/detection systems, infrastructure defense, vulnerability analysis, defense bypass, source code analysis, and exploit research. When Joff isn’t working or co-hosting the Security Weekly podcast, he enjoys making music and woodworking.

Day 2 - Friday, September 13th

ID
Time
Training
Instructor
0 13/09 09:00 AM - 17:00 PM Offensive Operations Against Foreign Adversaries: Russia
What if you were part of a State-sponsored hacking group, tasked with gaining access to a Russian defense contractor network? What high-value targets could you identify from an external, unauthenticated perspective using advanced OSINT techniques? How would you gain an initial foothold on an operating system that uses a foreign language? Can you enumerate compromised systems with your current tooling and operate in a new software ecosystem devoid of traditional Active Directory? What valuable information could you find and exfiltrate to achieve mission success? In the end, do you profit from your access or burn it all to the ground? Join us as we take you on a journey as a State-sponsored hacker pivoting through Russian defense networks. Register now
Steve Borosh started hacking the planet with Black Hills Information Security in 2021 and has been instructing offensive courses since 2015. Steve has instructed at conferences such as BlackHat and Wild West Hackin' Fest, for Fortune 500 companies, and for federal law enforcement. He currently annoys system administrators as part of the ANTISOC team at BHIS and enjoys releasing shock-and-awe research blogs and open-source tools to drive change in the industry.
1 13/09 09:00 AM - 17:00 PM SOC Core Skills w/ John Strand
16-hour course
Includes Certificate of participation and 6 months access to the course on-demand
This 16-hour information security training course will cover the core security skills all Security Operation Center (SOC) analysts need to have. These are the skills that all Black Hills Information Security (BHIS) SOC team members need to have.
  • Getting Started
  • TCP/IP
  • Headers
  • Shodan
  • TCPDump
  • Wireshark
  • Linux
  • Users and Privileges
  • Root
  • Home Directories and Hidden Files
  • Mkdir
  • Vi
  • Nano
  • Ps aux
  • Top
  • Ping
  • Nmap
  • Netstat
  • Bash History
  • Linux CLI
  • Windows Endpoint Analysis
  • PowerShell
  • DeepBlueCLI
  • DeepWhiteCLI
  • Server Analysis
  • CIS Benchmarks
  • Memory Forensics
  • Volatility
  • MITRE and UEBA
  • User Entity Behavior Analytics
  • JPCert Tools Analysis
  • False Positives
  • Lateral Movement
  • Logs
  • SIEM and %
  • GPO and Sysmon
Register now
John Strand has consulted and taught thousands of classes and hundreds of organizations in the areas of security, regulatory compliance, and penetration testing. He is a coveted speaker and much-loved former SANS instructor and course author. John is a contributor to the industry shaping Penetration Testing Execution Standard and 20 Critical Security Controls frameworks.
In 2008, John founded Black Hills Information Security (BHIS), a pentesting company that strives to understand its clients from a holistic perspective, emphasizing collaboration and education over stunt hacking. Since then, BHIS has grown to become a “tribe of companies” that includes Antisyphon Infosec Training, Active Countermeasures (ACM), Wild West Hackin’ Fest (WWHF), and more!
2 13/09 09:00 AM - 17:00 PM Introduction to Python w/ Joff Thyer
16-hour course
Includes Certificate of participation and 6 months access to the course on-demand
One of the most pressing needs Information Security professionals face today is the need to automate their work in both the attack, and defense context. Skills gained for automating tasks in programming languages are critical to scale up the efforts of a limited security professional talent pool. For example, it is not uncommon to find useful Python scripts on the Internet that are at a Proof-of-Concept stage to quickly achieve some information security professional goal. Penetration testers, incident responders, forensics, and defense professionals need the ability to be able to take existing code and produce stable functional Python tools or be able to debug an issue with an existing tool. This course aims to teach the fundamentals of the Python programming language such that a student will gain a beginning to intermediate level of competency with the language. Labs will be presented in a Capture the Flag (CTF) style format as well as some more comprehensive programming tasks.The expectation as to whether students can complete all exercises is dependent on prior student experience, and knowledge. Python is a language that is best approached if a student has some elementary programming background (such as shell scripting for example).
  • About Python
  • Python Shell
  • Strings, Input, Output
  • Writing your First Script
  • Code Blocks, Indentation
  • Functions
  • Conditional Logic
  • Lists
  • Loops
  • Modules
  • Dictionaries
  • Files and Databases
  • File Handling
  • Requests
  • Classes
  • Exception Handling
  • Regular Expressions
  • Furthering your Journey
Register now
Joff Thyer has been a penetration tester and security analyst with Black Hills Information Security since 2013. Prior to joining the InfoSec world, he had a long career in the IT industry as a systems administrator and an enterprise network architect. He has an Associate’s in Computer Science, a B.S. in Mathematics, and an M.S. in Computer Science, as well as several certifications. The best part of a penetration test for Joff is developing sophisticated malware that tackles defensive solutions, ultimately delivering exciting wins for company engagements. He has extensive experience covering intrusion prevention/detection systems, infrastructure defense, vulnerability analysis, defense bypass, source code analysis, and exploit research. When Joff isn’t working or co-hosting the Security Weekly podcast, he enjoys making music and woodworking.