

Active Directory Security and Hardening with Jordan Drysdale and Kent Ickler
This hands-on course is built for defenders who want to understand, audit, and harden AD from the inside out. Students will work directly in a lab environment to identify misconfigurations, analyze attack paths, implement defensive controls, and apply industry best practices to reduce risk.
Presented by:
Jordan Drysdale and Kent Ickler
Price: $825-1,450
Hours: 16

AI for Cybersecurity Professionals with Joff Thyer and Derek Banks
This course provides a detailed overview of Artificial Intelligence (AI) fundamentals for Cyber Security Professionals. The course covers foundational AI history, concepts, and data science underpinnings.
Participants will learn about various statistical approaches, in use by AI and machine learning which include regression techniques, support vector machines, gradient boosting algorithms and more. Considerable coverage is given to deep neural networks, and large language models with students learning how to setup an AI development environment for analysis work in Python, and Jupyter notebook.
Presented by:
Joff Thyer and Derek Banks
Price: $825-1,450
Hours: 16

Assumed Compromise: A Methodology with Detections and Microsoft Sentinel with Alyssa Snow and Kaitlyn Wimberley
This is an Active Directory post-exploitation course where students can walk through penetration testing methodology with two well-seasoned veterans. The courseware is entirely lab based and most of those labs are based on attacks used as part of an industry proven penetration testing methodology.
Presented by:
Alyssa Snow and Kaitlyn Wimberley
Price: $825-1,450
Hours: 16

Breaching the Cloud with Beau Bullock
Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. In this training course, hacking concepts will be introduced for each of those services.
Presented by:
Beau Bullock
Price: $1,450
Hours: 16
Please note – this class is in-person only, therefore it will not be streamed and no recording will be available.

Building a C2 Framework in Go with Faan Rossouw
Join this hands-on course to build a fully functional Command and Control (C2) framework from the ground up using Golang.
We will develop a server, an agent, and a client API, equipping our agent with practical functions like a reverse shell, system enumeration, and shellcode injection via a reflective loader.
Presented by:
Faan Rossouw
Price: $825-1,450
Hours: 16

Defending M365 and Azure with Kevin Klingbile
This class is designed to be an introduction to M365 and Azure security strategies.
This course will equip IT professionals with the knowledge and skills needed to defend Azure and Microsoft 365 environments effectively. We will cover cloud security measures and common misconfigurations. In addition, Red Teamers will learn to identify common attack surfaces within their client’s environments.
Presented by:
Kevin Klingbile
Price: $825-1,450
Hours: 16

Foundations in Space Cybersecurity: Hardware Edition with Tim Fowler
[Previously titled “Introduction to Cybersecurity in Space Systems (ICSS): Hardware Edition”]
Foundations in Space Cybersecurity: Hardware Edition is a course designed to expose cybersecurity professionals to the concepts and implementations of space systems including the ramification and impacts security can have on a mission. In this course each element is broken down into its most basic components and we look at how proper security can be applied; what tradeoffs must be made and many of the operational constraints governing every design decision.
Presented by:
Tim Fowler
Price: $2,050
Hours: 16
Please note – this class is in-person only, therefore it will not be streamed and no recording will be available.

Foundations of Security Operations with Hayden Covington
Have you ever wondered what it would be like to work in a SOC? Do you manage a SOC and want a better understanding of what goes on within? Or maybe you want to experience Elastic and how it can be used for threat detections and analysis?
Throughout the course you will gain an understanding of key functions of a SOC and it’s tools, specifically its SIEM and ticketing systems. You’ll learn how they work under the hood and how to bend them to your will. These fundamentals will build upon themselves until you find yourself writing custom sequence detections and investigating them when they fire.
Presented by:
Hayden Covington
Price: $825-1,450
Hours: 16

Hacking Active Directory: Fundamentals and Techniques with Dale Hobbs
The majority of enterprise networks today are managed using Microsoft Active Directory and it is crucial for a security professional to understand the current threats to a modern Windows environment.
The course begins with an overview of Active Directory architecture and how it can be leveraged by attackers to gain access to critical assets. Participants will learn about the various attack vectors and methods used to compromise Active Directory, such as password attacks, service abuse and privilege escalation.
Presented by:
Dale Hobbs
Price: $825-1,450
Hours: 16

Modern Webapp Pentesting with BB King
This course focuses on finding and exploiting the kinds of issues found in real webapps today, based on the instructor’s many years of ongoing experience in testing … real webapps today.
Presented by:
BB King
Price: $825-1,450
Hours: 16

Network Forensics and Incident Response with Troy Wojewoda
This course covers incident handling fundamentals, attacker methodologies, network protocol abuse detection, hands-on network packet analysis, Zeek scripting, flow data analysis, and real-world attack scenarios.
Presented by:
Troy Wojewoda
Price: $825-1,450
Hours: 16

Next Level OSINT with Mishaal Khan
This course progresses from basic to very advanced practical OSINT techniques that you can use in your investigative routine. No special software, operating system, or paid licenses are required.
Presented by:
Mishaal Khan
Price: $825-1,450
Hours: 16

Offense for Defense with Jason Downey
Welcome to “Offense for Defense,” presented by Red Siege Information Security. A specialized course tailored for information security blue teamers, or defenders, aiming to fortify their skills in offensive security strategies. Throughout this program, participants will delve into the fundamentals of offensive security, gaining insight into the tactics, techniques, and procedures employed by adversaries.
Presented by:
Jason Downey
Price: $825-1,450
Hours: 16

Offensive Tooling for Operators with Chris Traynor
This course focuses on the practical application of offensive security tools and techniques. Students will explore the methodologies and processes used by professional operators to attack their targets.
Presented by:
Chris Traynor
Price: $825-1,450
Hours: 16

Penetration Testing: Beyond the Basics with Tim Medin
Have you already taken Introduction to Pentesting with John Strand from Antispyhon? This course is meant as a follow on to the class, where we go into even more depth on what it takes to deliver a high-value penetration test. This course begins with tips and tricks for enumerating hosts, then dives into valuable initial access techniques. From there the course teaches how to identify additional targets via situational awareness, and of course, how to pivot to those hosts using practical lateral movement techniques.
Presented by:
Tim Medin
Price: $825-1,450
Hours: 16

Secure Coding & API Hardening: Hands-On Secure Design, Development, and Threat Modeling with Tanya Janca
In this intensive two-day hands-on training, participants will master the fundamentals and advanced techniques of secure application development and API hardening.
Using a “Bad, Better, Best” methodology, students will analyze vulnerable code, iteratively improve it, and implement robust security controls.
Presented by:
Tanya Janca
Price: $825-1,450
Hours: 16