Upcoming Events

July 01:
Time: 1:00 pm
Register Join TrustedSec for our latest webinar on Thursday, July 1 at 1PM Eastern Recent attacks on corporations  and government agencies to disrupt critical infrastructure have grabbed headlines across the media landscape in recent months. And while these stories capture...
July 07:
Time: 1:00 pm
Location: Online
Approaching an attack from all angles—conducting, detecting, and defending against them—can be a key element for strengthening the capabilities of security teams via Purple Team exercises and collaborative learning. However, finding practical examples of a correlated technique and detection can...
July 22:
Time: 9:00 am
Location: Online
Trainer: Ben Ten Skill Level: Students with a basic understanding of PowerShell and its functions Course Description: Whether you are a penetration tester or a defender, there is one common tool that is used very heavily by both teams; PowerShell. PowerShell...
July 31:
Time: 9:00 am
Location: Virtual
Join CEO David Kennedy  and the TrustedSec Training Team July 31 – August 3, 2021, for our virtual Black Hat USA four-day training course “Actionable Defense: Understanding Adversary Tactics.” OVERVIEW Most organizations struggle with understanding specific techniques and methodologies around...
August 26:
Time: 9:00 am
Location: Online
Trainer: Ben Mauch Skill Level: All Course Description: This course will focus on attacks used in the wild and how to create specific detections to identify early Indicators of Compromise (IoC). The students will set up an ELK (Elasticsearch, Log...
September 16:
Time: 8:00 am
Location: Online
Trainer: Carlos Perez Skill Level: Basic   Course Description: This course covers the fundamentals of Microsoft Sysinternals Sysmon, from basic use of the command line to deployment considerations and understanding how each event type works. This course is designed for...
October 21:
Time: 9:00 am
Location: Online
Trainer: Carlos Perez Course Description: Mimikatz is a POC written by Benjamin Delpy as a way for him to learn C and show some of the design risks in many of Windows authentication subsystems. The tool has become the #1 tool...