
The Professionally Evil Application Security (PEAS) course is designed to teach developers, IT professionals, and penetration testers of all skill levels.
Live Training $50 - $575
Course Length: 16 Hours
Includes a Certificate of Completion
Next scheduled date: September 29th, 2025 @ 9:30 AM EDT
Description
The Professionally Evil Application Security (PEAS) course is designed to teach developers, IT professionals, and penetration testers of all skill levels.
This course focuses on the techniques used to assess and exploit applications; including web and mobile applications, APIs, and HTTP-based systems. We combine these techniques with explanations of the risks exposed and defenses required to improve the security of your organization. The course uses a large number of hands-on exercises to reinforce the techniques and understanding an attendee will gain so that they benefit on the very first day back to work. The course focuses on manual techniques for discovery and exploitation while teaching an industry-standard methodology of reconnaissance, mapping, discovery, and exploitation. This methodology provides a comprehensive standard for assessing applications and APIs.
System Requirements
-
Student Equipment And Software Requirements
- All students must have installed the BURP Community software. Download available at: https://portswigger.net/burp/communitydownload
Syllabus
Session One:
-
- Introduction
-
- Preparation
-
- How the web works
-
- Scoping
-
- Hosting Services
-
- Limitations
-
- Tools used in assessing applications
-
- Methodology
-
- Preparation
-
- Reconnaissance
-
- Recon Overview
-
- Recon Tools
-
- Types of data
-
- Sensitive data exposure
-
- Reconnaissance
-
- Mapping
-
- Mapping Overview
-
- Platform Detection
-
- Application types
-
- Fingerprinting
-
- HTTP Overview
-
- Finding Vulnerabilities
-
- Mapping
Session Two
-
- Discovery
-
- Injections
-
- Buffer Overflow
-
- Code Injection
-
- Command Injection
-
- Cross-Site Scripting(XSS)
-
- Insecure Deserialization
-
- LDAP Injections
-
- Logic Flaws and Race Conditions
-
- Server-Side Request Forgery (SSRF)
-
- SQL Injections
-
- XML External Entity
-
- Injections
-
- Cross Site Request Forgery
-
- Discovery
-
- Exploitation
-
- Context
-
- Validation
-
- Ranking Severity
-
- Pivoting
-
- Shells
-
- Payloads
-
- Pivoting
-
- Exploitation
-
- Reporting
FAQ
IT Professional
Developers
Students
Intermediate
About the Instructor

Jordan Bonagura
"Senior Security Consultant at Secure Ideas"Bio
With more than 20 years of experience in information security, Jordan is passionate about helping companies and clients protect their data and applications from threats and vulnerabilities. As a Principal Security Researcher he had led teams in conducting vulnerability management, risk assessments, penetration tests, etc. He also had the opportunity to speak at security conferences around the globe, be a college professor and also a consultant for the Brazilian police in crime solving.
Register for Upcoming
-
Filter by Product Date
-
Filter by Product Instructor
-
Filter by Product Type
Professionally Evil Application Security: From Mapping to Exploitation with Jordan Bonagura
Complete Package
Live Training Jordan Bonagura
Virtual
Includes certificate of participation, twelve months access to Cyber Range, six months access to class recordings and our appreciation
Pay Forward What You Can
Live Training Jordan Bonagura
Virtual
Includes certificate of participation, six months access to Cyber Range, six months access to class recordings and our appreciation
Pay Forward What You Can
Live Training Jordan Bonagura
Virtual
Includes certificate of participation, six months access to Cyber Range, six months access to class recordings and our appreciation
Pay Forward What You Can
Live Training Jordan Bonagura
Virtual
Includes certificate of participation, six months access to class recordings and our appreciation
Pay Forward What You Can
Live Training Jordan Bonagura
Virtual
Includes certificate of participation, six months access to class recordings and our appreciation
Pay Forward What You Can
Live Training Jordan Bonagura
Virtual
Includes certificate of participation, six months access to class recordings and our appreciation
Similar Courses
-
Multiple InstructorsLiveOD
Advanced Endpoint Investigations with Alissa Torres
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: Getting Comfortable in Burp Suite with BB King
View Course -
Multiple InstructorsLive
Workshop: AI Foundation: Cyber Security Workflow Optimization using AI Technology with Joff Thyer and Derek Banks
View Course -
Multiple InstructorsLive
Workshop: The OWASP API Security Top Ten 2023 with Tanya Janca
View Course This product has multiple variants. The options may be chosen on the product page