PODCAST: Attack Tactics Part 2




Black Hills Information Security show

Summary: <br> John talked about how we’d attack, here’s how you can defend against those attacks. Grab the slides here: <a href="https://blackhillsinformationsecurity.shootproof.com/gallery/6843799/">https://blackhillsinformationsecurity.shootproof.com/gallery/6843799/</a><br> <br> <br> <br> <br> <br> <br> <br> <br> <br> <br> <br> <br> <br> <br> <br> <br> Want to level up your skills and learn more straight from John himself?You can check out his classes below!<br> <br> <br> <br> <a rel="noreferrer noopener" href="https://www.antisyphontraining.com/soc-core-skills-w-john-strand/" target="_blank">SOC Core Skills</a><br> <br> <br> <br> <a rel="noreferrer noopener" href="https://www.antisyphontraining.com/active-defense-cyber-deception-w-john-strand/" target="_blank">Active Defense &amp; Cyber Deception</a><br> <br> <br> <br> <a rel="noreferrer noopener" href="https://www.antisyphontraining.com/getting-started-in-security-with-bhis-and-mitre-attck-w-john-strand/" target="_blank">Getting Started in Security with BHIS and MITRE ATT&amp;CK</a><br> <br> <br> <br> <a rel="noreferrer noopener" href="https://www.antisyphontraining.com/introduction-to-pentesting/" target="_blank">Introduction to Pentesting</a><br> <br> <br> <br> <br> Available live/virtual and on-demand<br> <br> <br> <br> <br> <br> <br> <br> <br> <br> <br> <br> <br> <br> <br> <br> <br> <br> <br>