Learn directly from our security experts with online training courses

We’ve expanded our cutting edge training to help further educate and develop the Information Security industry. These fully online training offerings are designed to be some of the most effective instructor-led and live courses available today. Taught directly by TrustedSec consultants and based on real-world tests and assessments, our courses offer a range of scenarios designed to be applicable in day-to-day security operations.

Our trainings and have been conducted at some of the best and largest security events around the world. For example, our BlackHat training courses are consistently some of the largest courses taught, and every year and our ratings continue to demonstrate the quality and knowledge of our team. With our online training, we want these courses to be the best available to anyone, anywhere.

  • Online Training Course - PowerShell

    TrustedSec is bringing you two PowerShell courses from Ben Ten. Whether you are a penetration tester or a defender, there is one common tool that is used heavily by both teams—PowerShell. PowerShell has become an organization’s best friend and potentially its worst enemy.
    Take these courses back to back as a 4-day intensive dive into PowerShell! Only want to learn the basics? Join Ben for "PowerShell Fundamentals" for 2-days. Already have some experience? Jump straight to "PowerShell for Offense and Defense" for 2-days.

    Learn More
  • Online Training Course - Sysinternals Sysmon Fundamentals

    This course covers the fundamentals of Microsoft Sysinternals Sysmon, from basic use of the command line to deployment considerations and understanding how each event type works. This course is designed for the defender who is just getting started with using the Sysinternals Sysmon tool for collecting information to aid in the hunt and detection of abuse of Windows environments.

    Learn More
  • Online Training Course - Adversarial Attacks & Detections

    This course will focus on attacks used in the wild and how to create specific detections to identify early Indicators of Compromise (IoC). The students will set up an ELK (Elasticsearch, Log Stash, Kibana) instance and then run attacks on a lab system. The students will then create rules to detect the attack in ELK. The students will set up their ELK system for a final lab where a simulated attack will occur on their systems and they have to detect and defend against the attacks. This course will focus on the MITRE ATT&CK framework as well as several attacks which do not leverage a vulnerability. These attacks include weak credential harvest, lateral credential spray, SPN queries, and more. The students will have a better understanding of early IoCs and how to identify these threats within their environment; regardless of the initial attack vector.

    Learn More
  • Online Training Course - The Business of Security

    One of the biggest challenges related to Information Security is successfully bridging the communications gap between the technical security teams and executive leadership. This two-day course is intended to help technically-minded security professionals better understand the business side of security as it relates to needs, priorities, language, adversaries, and program building.

    Learn More
  • Online Training Course - Mimikatz: Everything You Need to Know

    Mimikatz is a POC written by Benjamin Delpy as a way for him to learn C and show some of the design risks in many of Windows authentication subsystems. The class will cover in detail the fundamentals of the toolset Benjamin has developed including features that many don’t even know it has.

    Learn More

Frequently Asked Questions

  • What are the basic technical requirements to attend an online course?

    To participate in an online training course, students will need:An internet connection – broadband wired or wireless (3G or 4G/LTE)

    • Speakers and a microphone – built-in or USB plug-in or wireless Bluetooth
    • A webcam or HD webcam – built-in or USB plug-in
    • Or, a HD cam or HD camcorder with video capture card
    • Dual monitors are suggested to follow class and participate in labs simultaneously

     

    Student computers will need to be able to run one of the following operating systems:

    • macOS X with macOS 10.7 or later
    • Windows 10
    • Windows 8 or 8.1
    • Windows 7
    • Windows Vista with SP1 or later
    • Windows XP with SP3 or later
    • Ubuntu 12.04 or higher
    • Mint 17.1 or higher
    • Red Hat Enterprise Linux 6.4 or higher
    • Oracle Linux 6.4 or higher
    • CentOS 6.4 or higher
    • Fedora 21 or higher
    • OpenSUSE 13.2 or higher
    • ArchLinux (64-bit only)

     

    Student’s computers will need to be able to support one of the following browsers:

    • Windows: IE 11+, Edge 12+, Firefox 27+,  Chrome 30+
    • Mac: Safari 7+, Firefox 27+, Chrome 30+
    • Linux: Firefox 27+, Chrome 30+
  • What do TrustedSec online training courses include?

    Each course is created and taught by a TrustedSec consultant. The course will consist of lectures (which can include videos, slides, text and additional resources) and interactive labs to enhance the learning experience for all students. During the course, you’ll receive group instruction along with one-on-one sessions with instructors or assistants to guide you throughout the class. Course slides and lab guides will be provided after the course at the instructor’s discretion.

  • Are courses refundable?

    Full refunds are available up to 24 hours before the scheduled start of the course.

  • Are courses taught live? Are they recorded and available for viewing after?

    All courses are taught live by a TrustedSec consultant and are not available as a recording.

  • Are CPE (continuing professional education) credits offered for these courses?

    Yes. Your instructor will provide information during the course on how to obtain CPEs following the completion of the course. All attendees will receive a digital certificate upon completion as well.

  • Are customized training courses offered?

    Yes. TrustedSec offers custom trainings online or in-person for organizations. Please contact us to discuss what kind of training would best help your organization.

  • How do I enroll in a course?

    After locating the training that you’re interested in, register for the course on Eventbrite. Once you’ve completed payment and registration, your instructor will provide information about how to access the course “room” and labs once the course begins.