Wild West Hackin’ Fest – Deadwood 2025

Pre-Conference Training
October 7-8, 2025

Location
Deadwood Mountain Grand
1906 Deadwood Mountain Dr, Deadwood, SD 57732

Live and Virtual Conference
October 8-10, 2025

Register Now!

Offensive Tooling for Operators with Chris Traynor

This course focuses on the practical application of offensive security tools and techniques. Students will explore the methodologies and processes used by professional operators to attack their targets.

Presented by: Chris Traynor
Price: $725-1,150
Hours: 16

AI for Cybersecurity Professionals with Joff Thyer & Derek Banks

This course provides an introduction to the application of artificial intelligence (AI) in the field of information security.

Designed for information security defenders, the course covers foundational AI history, concepts, and data science underpinnings. 

Participants will learn how AI enhances threat detection, malware analysis, incident response, and can be used as a daily task accelerator.  The course includes hands-on sessions where participants will learn how to setup an AI development environment, program and leverage some pre-trained models for predictive analysis in Python and Jupyter Notebook, and utilize some existing frameworks for AI-LLM prompt engineering. 

Presented by: Joff Thyer and Derek Banks
Price: $725-1,150
Hours: 16

Breaching the Cloud w/ Beau Bullock

Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. In this training course, hacking concepts will be introduced for each of those services.

Presented by: Beau Bullock
Price: $1,150
Hours: 16
Please note – this class is in-person only, therefore it will not be streamed and no recording will be available.

Cyber Security Incident Command w/ Gerard Johansen

The Cybersecurity Incident Command course is designed to provide students with the foundational concepts and techniques necessary to manage a cybersecurity incident.

The focus is on building knowledge and skills in the operational and strategic levels of incident response such as crisis communications, crafting containment and eradication plans and managing the various teams leveraged during an incident.

Presented by: Gerard Johansen
Price: $725-1,150
Hours: 16

Defending M365 & Azure w/ Kevin Klingbile

This class is designed to be an introduction to M365 and Azure security strategies.

This course will equip IT professionals with the knowledge and skills needed to defend Azure and Microsoft 365 environments effectively. We will cover cloud security measures and common misconfigurations. In addition, Red Teamers will learn to identify common attack surfaces within their client’s environments.

Presented by: Kevin Klingbile
Price: $725-1,150
Hours: 16

Foundations in Space Cybersecurity: Hardware Edition with Tim Fowler

[Previously titled “Introduction to Cybersecurity in Space Systems (ICSS): Hardware Edition”]

Foundations in Space Cybersecurity: Hardware Edition is a course designed to expose cybersecurity professionals to the concepts and implementations of space systems including the ramification and impacts security can have on a mission. In this course each element is broken down into its most basic components and we look at how proper security can be applied; what tradeoffs must be made and many of the operational constraints governing every design decision.

Presented by: Tim Fowler
Price: $1,600
Hours: 16
Please note – this class is in-person only, therefore it will not be streamed and no recording will be available.

Foundations of SOC with Elastic and Jira w/ Hayden Covington

Have you ever wondered what it would be like to work in a SOC? Do you manage a SOC and want a better understanding of what goes on within? Or maybe you want to experience Elastic and how it can be used for threat detections and analysis?

Throughout the course you will gain an understanding of key functions of a SOC and it’s tools, specifically its SIEM and ticketing systems. You’ll learn how they work under the hood and how to bend them to your will. These fundamentals will build upon themselves until you find yourself writing custom sequence detections and investigating them when they fire.

Presented by: Hayden Covington
Price: $725-1,150
Hours: 16

Hacking Active Directory: Fundamentals and Techniques w/ Dale Hobbs

The majority of enterprise networks today are managed using Microsoft Active Directory and it is crucial for a security professional to understand the current threats to a modern Windows environment.

The course begins with an overview of Active Directory architecture and how it can be leveraged by attackers to gain access to critical assets. Participants will learn about the various attack vectors and methods used to compromise Active Directory, such as password attacks, service abuse and privilege escalation.

Presented by: Dale Hobbs
Price: $725-1,150
Hours: 16

Intro to IoT Hacking w/ Rick Wisser & David Fletcher

As we move further and further into the age of the Internet of Things (IoT) we are increasingly surrounded by devices that collect, analyze, and share information about the world around us. This course will serve as an introduction to IoT hacking, where we look at familiar devices and lay the groundwork for hardware security analysis.

Presented by: Rick Wisser & David Fletcher
Price: $1,400
Hours: 16
Please note – this class is in-person only, therefore it will not be streamed and no recording will be available.

Introduction to Pentesting w/ John Strand

Are you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements, operational phases, and a constant flood of new vulnerabilities hitting the industry, the journey into penetration testing can quickly become confusing.

Presented by: John Strand
Price: $725-1,150
Hours: 16

Modern Webapp Pentesting w/ BB King

This course focuses on finding and exploiting the kinds of issues found in real webapps today, based on the instructor’s many years of ongoing experience in testing … real webapps today.

Presented by: BB King
Price: $725-1,150
Hours: 16

Next Level OSINT w/ Mishaal Khan

This course progresses from basic to very advanced practical OSINT techniques that you can use in your investigative routine. No special software, operating system, or paid licenses are required.

Presented by: Mishaal Khan
Price: $725-1,150
Hours: 16

Offense for Defense w/ Jason Downey & Mike Saunders

Welcome to “Offense for Defense,” presented by Red Siege Information Security. A specialized course tailored for information security blue teamers, or defenders, aiming to fortify their skills in offensive security strategies. Throughout this program, participants will delve into the fundamentals of offensive security, gaining insight into the tactics, techniques, and procedures employed by adversaries.

Presented by: Jason Downey and Mike Saunders
Price: $725-1,150
Hours: 16

Penetration Testing: Beyond the Basics w/ Tim Medin

Have you already taken Introduction to Pentesting with John Strand from Antispyhon? This course is meant as a follow on to the class, where we go into even more depth on what it takes to deliver a high-value penetration test. This course begins with tips and tricks for enumerating hosts, then dives into valuable initial access techniques. From there the course teaches how to identify additional targets via situational awareness, and of course, how to pivot to those hosts using practical lateral movement techniques.

Presented by: Tim Medlin
Price: $725-1,150
Hours: 16

Purple Teaming: Attack Emulation, Reporting, and Detection Identification w/ Carrie Roberts

This class will provide an overview of the MITRE ATT&CK framework and give you in-depth, hands-on knowledge of how to execute scripted attack emulations that exercise many of the techniques defined in the MITRE ATT&CK Framework.Overview Similar Courses

Presented by: Carrie Roberts
Price: $725-1,150
Hours: 16

Ransomware Attack Simulation and Investigation for Blue Teamers w/ Markus Schober

As a cyber security defender and investigator, understanding ransomware attacks is crucial for effective response. In this workshop, participants will learn how attackers operate, set up a C2 infrastructure with Empire, and execute a simulated attack, step-by-step, from initial access all the way throughout post-exploitation phases, each student in their own Active Directory enabled lab environment.

Presented by: Markus Schober
Price: $725-1,150
Hours: 16

Red Team Initial Access w/ Michael Allen

Getting a foothold is the first step in a successful breach—and due to modern defenses, it is often the most difficult. In this class, students will learn to execute the most effective and up-to-date methods for breaching a modern enterprise environment and obtaining initial access.

Presented by: Michael Allen
Price: $725-1,150
Hours: 16

Securing the Cloud: Foundations w/ Andrew Krug

In this course, we’ll explore Amazon Web Services (AWS) as a platform. We will take the perspective of a new startup company spinning up infrastructure in AWS for the very first time. We’ll use a scenario-based approach, where you’ll don the persona of a security engineer on your first day at a new startup.

Presented by: Andrew Krug
Price: $725-1,150
Hours: 16

Join us for the Deadwood edition of Wild West Hackin’ Fest in 2025!