Top-tier Training Classes for your team from the industry's best
Our instructors have over two decades of experience in the technology and education industries, ranging from Penetration Testing and Software Development to Open Source Coding and AD Infrastructure.
We are excited to partner with Antisyphon, which hosts our Secure Ideas Training courses.
Looking to have Secure Ideas work privately with your organization? Check out our Corporate Training Catalog and schedule some time with us. We are here to help you stay ahead of the competition!
Whether you're looking for a new certification and are in need of CPEs or just looking for ways to improve your organization's security posture, we offer a training solution that fits your needs. Our training options currently consist of both live and recorded courses, including tailored training for organizations and both virtual and in-person training.
The Red Team Fundamentals for Active Directory course is an 8-hour class focused on explaining the fundamentals of Active Directory and how different ...
This will be a high level exploration of the Payment Card Industry Security Standards Council. Students will receive a strong understanding of the ...
Welcome to the world of application security, where you’ll unravel the hidden flaws lurking within server-side portions of web applications. Join us ...
This course will teach you how to test web APIs for authorization and access control related security flaws. You will learn how to map API ...
In this comprehensive training course, participants will gain a deep understanding of the vulnerabilities that could potentially exist within ...
Embark on the finale of our Professionally Evil Application Security series with our course, Mastering Client-Side Flaws and Exploitation. In this ...
Are you interested in learning how to test different types of APIs for quality and security? Do you want to dive into the essential skills and ...
This training course aims to equip participants with the skills necessary to defend and harden Kubernetes systems effectively. The curriculum will ...
Pricing and Discounts
At the end of the day, Secure Ideas wants to give you the tools to help your business succeed. The more you know about your organization's needs, the more we can do to make sure your systems are well-protected against whatever threats are out there.
As one of the fastest-growing industries in the world, Cybersecurity suffers from a considerable skills gap in employable and skilled candidates. The old models of expensive training reserved for top performers no longer fits the needs of the industry, and the economic difficulties of the past few years have demonstrated that affordable training is mandatory to match candidates with employment opportunities. Secure Ideas is proud to offer the "Pay What You Can" model for our Professionally Evil CISSP Mentorship Program.*
Corporate Training Catalog
Professionally Evil Application Security
The Professionally Evil Application Security (PEAS) course is designed to teach developers, IT professionals, and penetration testers of all skill levels. This course focuses on the techniques used to assess and exploit applications; including web and mobile applications, APIs, and HTTP-based systems. We combine these techniques with explanations of the risks exposed and defenses required to improve the security of your organization. The course uses a large number of hands-on exercises to reinforce the techniques and understanding an attendee will gain so that they benefit on the very first day back to work. The course focuses on manual techniques for discovery and exploitation while teaching an industry-standard methodology of reconnaissance, mapping, discovery, and exploitation. This methodology provides a comprehensive standard for assessing applications and APIs.
Foundational Data Protection Training
This foundational course is designed to provide the basic tools needed to protect the data that is most valuable to your business. Since data is an integral part of an organization’s core operations, it’s important to build a solid foundation for understanding the considerations and mechanisms related to data protection.
The protection of sensitive data is paramount for information security professionals. The course is intended to help provide the techniques and tools needed to conduct a self-assessment of your data protection program. This helps ensure that your limited resources are being dedicated to the places within your security program needing the most attention, and based on corporate goals, needs, and regulatory compliance requirements.
OWASP Top 10
In this course, Secure Ideas will walk attendees through the various items in the latest OWASP Top 10 and corresponding controls. Students will leverage modern applications to explore how the vulnerabilities work and how to find them in their own applications.
Red Team Fundamentals for Active Directory
The course mixes lecture with a number of hands-on exercises to reinforce the information and techniques. The activities will cover ways to examine an Active Directory environment, looking for a variety of misconfigurations that are commonly seen in Active Directory implementations (even by some security conscious entities), and then exploit these issues to pivot and escalate our access. Ultimately, the students will gain full control of an AD Forest.
While in class, students will be provided access to a lab containing realistic targets and tools to learn both the attacks and defenses of Active Directory. This environment enables the attendees to understand how the covered techniques are used in the real world.
Professionally Evil Network Testing
Introduction to PCI
Foundational Application Security Training
Professionally Evil Container Security
Professionally Evil API Testing