Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

Courses

Live Events

Conquering your CISSP with Jason Gillam from Secure Ideas

Anti-Cast: Conquering your CISSP with Jason Gillam from Secure Ideas

September 4, 2024 @ 12:00 pm – 1:00 pm EDT Join us for a free one-hour Antisyphon Anti-cast from instructor, Jason Gillam from Secure Ideas, on mastering the CISSP (Certified Information Systems Security Professional) exam – one of the most respected certifications in the information security industry. In this Anti-cast,…

Secure Code Summit presented by Antisyphon Training

Secure Code Summit

…career and secure your systems.  Register now to secure your spot and explore our additional paid training opportunities to further enhance your skills. Register for Post-Summit Training Below Multiple Instructors Live AI for Cybersecurity Professionals with Joff Thyer and Derek Banks Beau Bullock Live OD Breaching the Cloud with Beau…

Social Posts

Blog Posts

Professionally Evil CISSP Mentorship

Secure Ideas and Antisyphon Unite for CISSP Mentorship Program!

Looking for a little help in preparing for the CISSP certification but don’t want to spend a fortune? Look no further, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification! Can this program get any better? Why yes, yes it can. This program…

Burp Suite Basics

…well. Maybe, a little bit more time consuming from the free versions of software. So quick background on me. For those of you who don’t know, I am a senior security consultant at secure ideas. I am based out of Jacksonville, Florida, which is where secure ideas is headquartered. But…

Conquering your CISSP

…So I’ll give you some initial guidance. Now, as part of Secure Ideas, we do a ten week mentorship program that is for studying for the CISSP and I think it starts up next week actually, for the current run.   So part of what I’ll be talking about is what…

From Zero to Hero: Beginner’s Guide to Active Directory

…show, attackers are always, almost always going after active directory because most companies today, have some form of active directory in their environment. So it is key to have a solid understanding of the various different components, how to secure them, against the various different attacks. So again, active directory,…

Active Directory Hacking: 3 “New” Techniques

…showing of, security is in a movie. And episode four is the most realistic to me. Because at the beginning, they’re all sitting in a boardroom discussing how secure the Death Star is. And one guy’s like, it doesn’t matter what sort of information or technical data they have. It’s…

Shopping Cart

No products in the cart.