Top-tier Training Classes for your team from the industry's best
Our instructors have over two decades of experience in the technology and education industries, ranging from Penetration Testing and Software Development to Open Source Coding and AD Infrastructure.
We are excited to partner with Antisyphon, which hosts our Secure Ideas Training courses.
Looking to have Secure Ideas work privately with your organization? Check out our Corporate Training Catalog and schedule some time with us. We are here to help you stay ahead of the competition!
Upcoming Classes
Whether you're looking for a new certification and are in need of CPEs or just looking for ways to improve your organization's security posture, we offer a training solution that fits your needs. Our training options currently consist of both live and recorded courses, including tailored training for organizations and both virtual and in-person training.
Pricing and Discounts
At the end of the day, Secure Ideas wants to give you the tools to help your business succeed. The more you know about your organization's needs, the more we can do to make sure your systems are well-protected against whatever threats are out there.
As one of the fastest-growing industries in the world, Cybersecurity suffers from a considerable skills gap in employable and skilled candidates. The old models of expensive training reserved for top performers no longer fits the needs of the industry, and the economic difficulties of the past few years have demonstrated that affordable training is mandatory to match candidates with employment opportunities. Secure Ideas is proud to offer the "Pay What You Can" model for our Professionally Evil CISSP Mentorship Program.*
Corporate Training Catalog
- Application Security
- Foundational Data Protection
- OWASP Top 10
- Red Team Fundamentals for Active Directory
- Network Testing
- Introduction to PCI
- Foundational Application Security
- Container Security
- API Testing
Professionally Evil Application Security
The Professionally Evil Application Security (PEAS) course is designed to teach developers, IT professionals, and penetration testers of all skill levels. This course focuses on the techniques used to assess and exploit applications; including web and mobile applications, APIs, and HTTP-based systems. We combine these techniques with explanations of the risks exposed and defenses required to improve the security of your organization. The course uses a large number of hands-on exercises to reinforce the techniques and understanding an attendee will gain so that they benefit on the very first day back to work. The course focuses on manual techniques for discovery and exploitation while teaching an industry-standard methodology of reconnaissance, mapping, discovery, and exploitation. This methodology provides a comprehensive standard for assessing applications and APIs.
Foundational Data Protection Training
This foundational course is designed to provide the basic tools needed to protect the data that is most valuable to your business. Since data is an integral part of an organization’s core operations, it’s important to build a solid foundation for understanding the considerations and mechanisms related to data protection.
The protection of sensitive data is paramount for information security professionals. The course is intended to help provide the techniques and tools needed to conduct a self-assessment of your data protection program. This helps ensure that your limited resources are being dedicated to the places within your security program needing the most attention, and based on corporate goals, needs, and regulatory compliance requirements.
OWASP Top 10
In this course, Secure Ideas will walk attendees through the various items in the latest OWASP Top 10 and corresponding controls. Students will leverage modern applications to explore how the vulnerabilities work and how to find them in their own applications.
Red Team Fundamentals for Active Directory
The course mixes lecture with a number of hands-on exercises to reinforce the information and techniques. The activities will cover ways to examine an Active Directory environment, looking for a variety of misconfigurations that are commonly seen in Active Directory implementations (even by some security conscious entities), and then exploit these issues to pivot and escalate our access. Ultimately, the students will gain full control of an AD Forest.
While in class, students will be provided access to a lab containing realistic targets and tools to learn both the attacks and defenses of Active Directory. This environment enables the attendees to understand how the covered techniques are used in the real world.
Professionally Evil Network Testing
Introduction to PCI
Foundational Application Security Training
Professionally Evil Container Security
Professionally Evil API Testing