Skip to content
Antisyphon Training

Antisyphon Training

  • Home
  • News & Updates
  • Calendar
  • Training
    • Course Catalog
    • Live Training
      • Live Courses Catalog
      • Live Training Calendar
    • On-Demand Training
      • On-Demand Catalog
      • Security for MSPs
    • Pay What You Can Training
    • Cybersecurity Training for Businesses
    • The Vault Program
    • Training Roadmap
  • Summits
    • Upcoming Summits
    • Past Summits
  • Cyber Range
    • About Our Cyber Range
    • ACE-T™ Certification
    • Purchase Subscription
  • About
    • Mission
    • FAQ
    • Our Instructors
    • Giving Back
    • Testimonials
  • Contact Us
  • Toggle search form
Professionally Evil Application Security (PEAS): Mastering Application Reconnaissance and Mapping

Join Kevin Johnson for class next week!

Posted on August 31, 2023September 1, 2023 By
Professionally Evil Application Security (PEAS): Mastering Application Reconnaissance and Mapping

Join Kevin Johnson next week, Sept. 6, 2023, for the first class in the Professionally Evil Application Security (PEAS) series, “Professionally Evil Application Security (PEAS): Mastering Application Reconnaissance and Mapping”! This is a Pay-What-You-Can class that includes 6 months of access to class recordings.
Check out class details and register here.
View all the classes in the PEAS series here!

Kevin Johnson
Kevin Johnson

Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and application development. He has been involved in building incident response and forensic teams, architecting security solutions for large enterprises, and penetration testing everything from government agencies to Fortune 100 companies. In addition, Kevin is a faculty member at IANS and was an instructor and author for the SANS Institute.

News Tags:Kevin Johnson, PEAS, Professionally Evil Application Security, Professionally Evil Application Security (PEAS): Mastering Application Reconnaissance and Mapping, Secure Ideas

Post navigation

Previous Post: Antisyphon Cyber Range: Going in Reverse
Next Post: Miss our Anti-Cast, ‘XFS Forensics with xfs_d,’ with Hal Pomeranz?
Join the Antisyphon Training Discord Server!
  • Twitter
  • LinkedIn
  • Mastodon
PROMPT#

Copyright © 2023 Antisyphon

Powered by PressBook Dark WordPress theme