Virtual
- Events
- Virtual
Calendar of Events
S Sun
M Mon
T Tue
W Wed
T Thu
F Fri
S Sat
0 events,
0 events,
1 event,
Professionally Evil CISSP Mentorship Program
Professionally Evil CISSP Mentorship Program
ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
0 events,
0 events,
0 events,
0 events,
0 events,
0 events,
2 events,
Introduction to PCI (PCI 101) w/ Nathan Sweaney
Introduction to PCI (PCI 101) w/ Nathan Sweaney
This course is designed to introduce IT professionals to the Payment Card Industry collection of standards as defined and enforced by the Payment Card Industry Security Standards Council. The first half of the course summarizes the structure and history of PCI, the primary standards documents, and the various certification programs for professionals. The second half of the course dives into a summary of the components of the PCI Data Security Standard (PCI DSS). This is a high-level, introductory summary designed to provide a general understanding of the requirements in the PCI DSS.
Professionally Evil CISSP Mentorship Program
Professionally Evil CISSP Mentorship Program
ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
0 events,
0 events,
0 events,
0 events,
0 events,
0 events,
2 events,
Foundational Application Security Training (FAST) w/ Bill McCauley
Foundational Application Security Training (FAST) w/ Bill McCauley
The Foundational Application Security Training (FAST) course is a 4-hour Pay What You Can
class focused on explaining the fundamentals of applications and their security. This
lecture-focused class is designed to allow managers, product owners, support staff and
non-developers to understand application security. This lecture includes what makes up the
various modern application technologies, the application development process, what
vulnerabilities and risks are exposed via applications and how the attacks happen.
Professionally Evil CISSP Mentorship Program
Professionally Evil CISSP Mentorship Program
ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
0 events,
0 events,
0 events,
0 events,
0 events,
0 events,
2 events,
Getting Started in Packet Decoding w/ Chris Brenton
Getting Started in Packet Decoding w/ Chris Brenton
One of the core disciplines of security is understanding how systems communicate over the Internet. This skill set is crucial to spotting abnormal behavior and attack patterns. In this class, we will go beyond the fundamentals of how IP communicates and dive into the subtle nuances. This will help the student identify anomalous patterns when they occur.
Professionally Evil CISSP Mentorship Program
Professionally Evil CISSP Mentorship Program
ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
0 events,
0 events,
0 events,
1 event,
Professionally Evil CISSP Mentorship Program
Professionally Evil CISSP Mentorship Program
ISC2 describes the CISSP as a way to prove “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge. The mentorship program is designed as a 10-week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.
0 events,
3 events,
Antisyphon Training @ BSides Fort Wayne 2024
Antisyphon Training @ BSides Fort Wayne 2024
Antisyphon Training will be at BSidesFortWayne this Fort Wayne, IN, this May!
Modern Webapp Pentesting II: Webapp Internals w/ BB King
Modern Webapp Pentesting II: Webapp Internals w/ BB King
Modern Webapp Pentesting II: Webapp Internals is written as a followup to Modern Webapp Pentesting. This course builds on the fundamentals and gives you experience with how they apply to current problems in web applications.
Hacking Active Directory: Fundamentals and Techniques w/ Dale Hobbs
Hacking Active Directory: Fundamentals and Techniques w/ Dale Hobbs
The majority of enterprise networks today are managed using Microsoft Active Directory and it is crucial for a security professional to understand the current threats to a modern Windows environment.
The course begins with an overview of Active Directory architecture and how it can be leveraged by attackers to gain access to critical assets. Participants will learn about the various attack vectors and methods used to compromise Active Directory, such as password attacks, service abuse and privilege escalation.
0 events,
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.
- There are no events on this day.