facebookcode

Professionally Evil CISSP Mentor Program

October 5, 2021 – December 7, 2021

Lectures: Tuesdays from 2-4 pm EST

ISC2 describes the CISSP as a way to prove that “you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program”. It is one of the primary certifications used as a stepping point in your cybersecurity career. To accomplish this, Secure Ideas has developed a mentorship program designed to provide the knowledge necessary to pass the certification, while working through the common body of knowledge (CBK) in a manner that encourages retention of the knowledge.

The mentorship program is designed as a 10 week series of sessions along with various student support and communication methods. These work together to provide the student a solid foundation to not only help in passing the certification but to continue as a collection of information for everyday work. This class is set up to cover the 8 domains of the ISC2 CBK.

WE UNDERSTAND THAT NOT EVERYONE CAN AFFORD THE TRAINING THEY NEED

Let Us Empower You

As one of the fastest-growing industries in the world, Cyber Security suffers from a considerable skills gap in employable and skilled candidates. Addressing this problem requires creative solutions to bring quality training to interested personnel. The old models of expensive training reserved for top performers no longer fits the needs of the industry. The economic difficulties of the last year have demonstrated that affordable training is mandatory to match candidates with employment opportunities. Secure Ideas' Professionally Evil CISSP Mentorship Program is the first course to be offered using the "Pay What You Can" model.

To use the "PWYC" discount, feel free to apply the coupon code that corresponds to the amount you are able to pay*:

Pay What You Can

  • Books not included
$50
PWYC-50

  • Books not included
$100
PWYC-100

  • Books included
$200
PWYC-200

  • Books included
$400
PWYC-400

  • Books included
$800
PWYC-800
*If you cannot afford any of these price points and need to take the course for free, please email education@secureideas.com and let us know you need it. Limited free seats are available.
Kevin Johnson

Kevin Johnson

Chief Executive Officer

Kevin Johnson is the Chief Executive Officer of Secure Ideas and has a long history in the IT field including system administration, network architecture and application development. He has been involved in building incident response and forensic teams, architecting security solutions for large enterprises and penetration testing everything from government agencies to Fortune 100 companies. In addition, Kevin is a faculty member at IANS and was an instructor and author for the SANS Institute. Kevin is also very involved in the open source community. He runs a number of open source projects like SamuraiWTF, Laudanum, Yokoso, and a number of others.

Jason Gillam

Jason Gillam

Chief Information Officer

Jason Gillam is Chief Information Officer (CIO) at Secure Ideas and an IANS faculty member. He has over 20 years of industry experience in enterprise software development, system architecture, and application security. Jason has spent most of his career in technical leadership roles ranging from startups to Fortune 100 companies and has learned the business acumen necessary to advise everyone from developers to senior executives on security and architecture. Jason co-built and managed an award-winning application security design and testing program at one of the world's largest financial institutions and has also provided numerous application security training and awareness briefings to large internal technical audiences and led the development of best practices code and documentation for the same.

Eric Kuehn

Eric Kuehn

Principal Security Consultant

Before coming to Secure Ideas, Eric spent close to 20 years working with Microsoft infrastructures for large Fortune 100 companies. Since its release, his core focus has been Active Directory. He was the technical leader and responsible for the engineering and architecture of one of the most complex and largest AD infrastructures used by one of the world’s largest banks. This included ongoing maintenance and major enhancements of not only a highly secure authentication environment, but also of all the supporting tool sets required to monitor its health and integrity.

Interested?

Request information about hosting this course.