script type="text/javascript"> _linkedin_data_partner_id = "29129";
VIEW Upcoming Courses
HackEd was founded to address a lack of accessible hands-on-keyboard training in the cybersecurity industry. Our curriculum development is led by Peter Kim, author of The Hacker Playbook, and our courses are taught by industry practitioners who are excited to teach you the technical skills that employers value.
HackEd is based in Arlington, Virginia, and is the only state-certified hands-on-keyboard cybersecurity training provider inside the Washington, DC beltway. Join us in class this Spring over our cloud-based platform, HackEdLabs.
Certified to operate by the State of Virginia Higher Education Commission
Copyright HackEd, LLC 2016 | Licensed and Bonded | CAGE code: 80FT4 | DUNS: 080776356 | Trademark: 87504366
Course Overview
Dates and Registration
Instructors
Introduction to Pentesting
44 hours (24 Teaching, 20 Labs)
Course Overview:
This hands-on-keyboard course introduces students to the fundamental components needed to conduct enterprise penetration tests. Our materials follow the phases described within best practice penetration testing frameworks such as the Penetration Testing Execution Standard (PTES). Students learn to use common penetration testing tools such as Metasploit, Nmap, and reverse shells while attacking machines in our virtual lab. We cover the skills necessary to write reports and document findings that can easily be consumed by business executives as well as network and security engineers. Our introductory course combines instructional training with a hands-on lab environment to ensure that the concepts taught can be practically applied in a real-life environment.
Skills and techniques learned in this course include:
- Exploiting machines using attacks found on Exploit DB or available in the Metasploit framework
- Conducting open source recon of real world enterprises, collecting information to target systems
- Performing scripting attacks using common scripting languages such as Powershell and Python
- Scanning networks using tools such as Nmap and Masscan
- Performing post-exploitation with Metasploit’s Meterpreter and tools found on the compromised host
- Defining the scope of enterprise penetration tests and documenting rules of engagement
- Writing penetration testing reports for your client.
Live Online, or Self-Paced online:
April 17th - May 10th, Tuesdays and Thursdays, 7-10PM Eastern
April 10th: Student orientation and test connection to Lab environment.
Tuition:
Tuition for the full course + certificate + CTF + optional career coaching is $2750, payable in full (or three payments of $950). Individual modules are $1,250, payable in full.
Cancellation Policy:
You may cancel your registration to any course for any reason.
Individual Courses
If you cancel before the third class of the eight planned classes, you will receive a full refund. After that, cancellations are subject to a $100 processing fee. You may cancel until the mid-point of the course for a 50% refund, and until the end of the third quarter of the course for a 25% refund. No refund will be issued for cancellations in the last quarter of the course.
Full Program (three courses)
If you cancel before the third class of the twenty-four planned classes, you will receive a full refund. After that, cancellations are subject to a $100 processing fee. You may then cancel until the first quarter of the program (before the end of the 6th class) for a 75% refund, until the mid-point of the program (before the end of the 12th class) for a 50% refund, and until the end of the third quarter of the program (before the end of the 18th class) for a 25% refund. No refund will be issued for cancellations in the last quarter of the program.
Andrew
Weidenheimer
Andrew is the Director of Security and Privacy at RSM LLP and has close to 15 years of consulting and pentesting experience within the information security, telecommunications, and banking fields. Andrew is also the co-lead for the DC OWASP chapter and has had the privilege of speaking at security conferences including Defcon, OWASP AppSec, and the Rochester Security Summit. Andrew has a degree in computer engineering and holds several certifications, including the CISSP, CISA, and the OSCP. When Andrew is not hacking you can most often find him on the golf course. While not very good, he still enjoys the social aspect of the sport.
Joshua
SCHroeder
At UNC Charlotte, Joshua co-founded the 49th Security Division, a cybersecurity club to train students in offensive and defensive tactics. After graduate school, he led the deployment of several security projects for the Federal Reserve. At FireEye, Josh performed incident response for hundreds of clients, building scripts to perform IR hunting and developing content for its global training program. He now works for a government contractor performing internal Red Teaming and Penetration Testing.
download
Course Overview
Dates and Registration
Instructors
Web Application Hacking
44 hours (24 Teaching, 20 Labs)
Course Overview:
The objective of this course is to teach students the most common and effective attacks for use against web applications. We introduce students to the Open Web Application Security Project (OWASP) Top 10 web vulnerabilities and teach the skills necessary to exploit the most common ones. Students learn how to identify critical application vulnerabilities such as poorly sanitized user input, SQL Injection, Cross Site Scripting (XSS), and XML External Entity Injection (XXE), to name a few. In our virtual lab, students practice finding and exploiting these vulnerabilities to achieve remote code execution as well as access to sensitive data.
Skills and techniques learned in this course include:
- Learning how to find vulnerabilities for exploitation
- Performing practice attacks involving local and remote file inclusion, SQL injection, XSS, and moree
- Understanding the HTTP protocol, the scripting engines and databases behind webservers, and how these components can be abused
- Understanding the OWASP Top 10
- Learning how to identify and exploit critical application vulnerabilities using client proxies such as Burp and Webscarab
- Conducting automated web application scanning using open source tools such as OWASP Zap and Arachni
Live Online, or Self-Paced online:
May 22nd - June 14th, Tuesdays and Thursdays, 7-10PM Eastern
May 15th: Student orientation and test connection to Lab environment.
Tuition:
Tuition for the full course + certificate + CTF + optional career coaching is $2750, payable in full (or three payments of $950). Individual modules are $1,250, payable in full.
Cancellation Policy:
You may cancel your registration to any course for any reason.
Individual Courses
If you cancel before the third class of the eight planned classes, you will receive a full refund. After that, cancellations are subject to a $100 processing fee. You may cancel until the mid-point of the course for a 50% refund, and until the end of the third quarter of the course for a 25% refund. No refund will be issued for cancellations in the last quarter of the course.
Full Program (three courses)
If you cancel before the third class of the twenty-four planned classes, you will receive a full refund. After that, cancellations are subject to a $100 processing fee. You may then cancel until the first quarter of the program (before the end of the 6th class) for a 75% refund, until the mid-point of the program (before the end of the 12th class) for a 50% refund, and until the end of the third quarter of the program (before the end of the 18th class) for a 25% refund. No refund will be issued for cancellations in the last quarter of the program.
Andrew
Weidenheimer
Andrew is the Director of Security and Privacy at RSM LLP and has close to 15 years of consulting and pentesting experience within the information security, telecommunications, and banking fields. Andrew is also the co-lead for the DC OWASP chapter and has had the privilege of speaking at security conferences including Defcon, OWASP AppSec, and the Rochester Security Summit. Andrew has a degree in computer engineering and holds several certifications, including the CISSP, CISA, and the OSCP. When Andrew is not hacking you can most often find him on the golf course. While not very good, he still enjoys the social aspect of the sport.
Joshua
SCHroeder
At UNC Charlotte, Joshua co-founded the 49th Security Division, a cybersecurity club to train students in offensive and defensive tactics. After graduate school, he led the deployment of several security projects for the Federal Reserve. At FireEye, Josh performed incident response for hundreds of clients, building scripts to perform IR hunting and developing content for its global training program. He now works for a government contractor performing internal Red Teaming and Penetration Testing.
Course Overview
Dates and Registration
Instructors
Real World Red Teaming
44 hours (24 Teaching, 20 Labs)
Course Overview:
The objective of this course is to introduce students to more advanced tactics used by modern day adversaries. This course is designed to teach students the skills needed to covertly gain an initial foothold into an organization, establish persistence, and then pivot through machines and move laterally across networks to gain access to sensitive systems. The attacks taught in this course use a smaller footprint to minimize detection by network and host monitoring tools, mimicking techniques used by real world hackers to persist in networks unseen for months, or even years. Students learn the importance of stringing attacks together to access the client’s “crown jewels” and recognize why this is significant to business executives.
Skills and techniques learned in this course include:
- Gaining an initial foothold inside client network via targeted phishing campaigns
- Using weaponized office documents and java applets
- Establishing persistence though undetectable reverse payloads
- Leveraging Powershell to attack modern Active Directory environments
- Pivoting and escalating in a Windows Active Directory domain
- Exploiting Linux services such as Joomla and Mysql
- Establishing covert channels for data exfiltration (i.e. DNS, SSH, etc).
Live Online, or Self-Paced online:
June 26th - July 19th, Tuesdays and Thursdays, 7-10PM Eastern
June 19th: Student orientation and test connection to Lab environment.
Tuition:
Tuition for the full program + certificate + CTF + optional career coaching is $2750, payable in full (or three payments of $950). Individual courses are $1,250, payable in full.
Cancellation Policy:
You may cancel your registration to any course for any reason.
Individual Courses
If you cancel before the third class of the eight planned classes, you will receive a full refund. After that, cancellations are subject to a $100 processing fee. You may cancel until the mid-point of the course for a 50% refund, and until the end of the third quarter of the course for a 25% refund. No refund will be issued for cancellations in the last quarter of the course.
Full Program (three courses)
If you cancel before the third class of the twenty-four planned classes, you will receive a full refund. After that, cancellations are subject to a $100 processing fee. You may then cancel until the first quarter of the program (before the end of the 6th class) for a 75% refund, until the mid-point of the program (before the end of the 12th class) for a 50% refund, and until the end of the third quarter of the program (before the end of the 18th class) for a 25% refund. No refund will be issued for cancellations in the last quarter of the program.
Andrew
Weidenheimer
Andrew is the Director of Security and Privacy at RSM LLP and has close to 15 years of consulting and pentesting experience within the information security, telecommunications, and banking fields. Andrew is also the co-lead for the DC OWASP chapter and has had the privilege of speaking at security conferences including Defcon, OWASP AppSec, and the Rochester Security Summit. Andrew has a degree in computer engineering and holds several certifications, including the CISSP, CISA, and the OSCP. When Andrew is not hacking you can most often find him on the golf course. While not very good, he still enjoys the social aspect of the sport.
Joshua
SCHroeder
At UNC Charlotte, Joshua co-founded the 49th Security Division, a cybersecurity club to train students in offensive and defensive tactics. After graduate school, he led the deployment of several security projects for the Federal Reserve. At FireEye, Josh performed incident response for hundreds of clients, building scripts to perform IR hunting and developing content for its global training program. He now works for a government contractor performing internal Red Teaming and Penetration Testing.
HackEd was founded to address a lack of accessible hands-on-keyboard training in the cybersecurity industry. We hear from professionals and students around the country.
Here are a few quotes:
Developing the tangible skills employers are looking for isn’t easy or intuitive. You can be self-taught, but there is no instructor to help you when you get stuck. Most university programs are policy-oriented and do not provide a lab where students can
work. Nearly all certifications in the cybersecurity industry are still taught by the book and to the test, and do not require or facilitate any hands-on-keyboard work. There are some great hands-on-keyboard courses, but these are often $5,000 or more per week.
We are committed to making quality hands-on-keyboard education accessible.
There are no shortcuts to picking up these skills. Instructors, professionals and students all have to be prepared to put in the time.
Join us, and let’s put in the time together.
UPCOMING COURSES
Work with your peers in a stimulating environment in-person, and online.
Sharpen and grow your professional network.
Learn from industry professionals and develop a comprehensive view of the cybersecurity field.
Enhance your technical skills and reach professional development milestones.
Collaborate with other professionals from diverse backgrounds and disciplines.
Our curriculum is developed by Bud Roth, Daniel Ross, Tobias Mccurry, and Peter Kim, author of “The Hacker Playbook” series. Our lectures and written material are paired with a series of real-world labs on our virtual corporate network, HackEdLabs, to help you develop the skills employers need. Employers understand the value of certifications, but only if they’re backed by real skills.
HackEd provides you hands-on-keyboard training that is developed and delivered by industry practitioners. Our instructors understand the day-to-day requirements of security roles and are eager to share their knowledge and experiences with each class. During the program, you are encouraged to write your own tools, contribute to your Github repository, and participate in different bug bounty programs. Upon successful completion of the three courses, you will earn the HackEd Certified Red Teamer Level 1 certificate. We will also provide you with a roadmap of additional subjects to study to pass your CEH, GPEN, and OSCP.
This is not a series of online videos. This is not a comfortable academic program. This is not a course on cybersecurity policy. If you’re looking for an immersive experience where you will develop tangible skills that will make you better at your job and more employable, this is it.
UPCOMING COURSES
Course Name
Course
Price
Instruction Hours
Labs
Employer
Database
Exam
Price
HackEd Certified Red Teamer 1
$2,750
72
24/7
$0
GPEN
$6,210
48
In-class only
X
$999
Certified Ethical Hacker
$3,250
40
X
X
$500
Course Overview
Dates and Registration
Instructors
Introduction to Pentesting
44 hours (24 Teaching, 20 Labs)
Course Overview:
This hands-on-keyboard course introduces students to the fundamental components needed to conduct enterprise penetration tests. Our materials follow the phases described within best practice penetration testing frameworks such as the Penetration Testing Execution Standard (PTES). Students learn to use common penetration testing tools such as Metasploit, Nmap, and reverse shells while attacking machines in our virtual lab. We cover the skills necessary to write reports and document findings that can easily be consumed by business executives as well as network and security engineers. Our introductory course combines instructional training with a hands-on lab environment to ensure that the concepts taught can be practically applied in a real-life environment.
Skills and techniques learned in this course include:
- Exploiting machines using attacks found on Exploit DB or available in the Metasploit framework
- Conducting open source recon of real world enterprises, collecting information to target systems
- Performing scripting attacks using common scripting languages such as Powershell and Python
- Scanning networks using tools such as Nmap and Masscan
- Performing post-exploitation with Metasploit’s Meterpreter and tools found on the compromised host
- Defining the scope of enterprise penetration tests and documenting rules of engagement
- Writing penetration testing reports for your client.
Live Online, or Self-Paced online:
April 17th - May 10th, Tuesdays and Thursdays, 7-10PM Eastern
April 10th: Student orientation and test connection to Lab environment.
Tuition:
Tuition for the full course + certificate + CTF + optional career coaching is $2750, payable in full (or three payments of $950). Individual modules are $1,250, payable in full.
Cancellation Policy:
You may cancel your registration to any course for any reason.
Individual Courses
If you cancel before the third class of the eight planned classes, you will receive a full refund. After that, cancellations are subject to a $100 processing fee. You may cancel until the mid-point of the course for a 50% refund, and until the end of the third quarter of the course for a 25% refund. No refund will be issued for cancellations in the last quarter of the course.
Full Program (three courses)
If you cancel before the third class of the twenty-four planned classes, you will receive a full refund. After that, cancellations are subject to a $100 processing fee. You may then cancel until the first quarter of the program (before the end of the 6th class) for a 75% refund, until the mid-point of the program (before the end of the 12th class) for a 50% refund, and until the end of the third quarter of the program (before the end of the 18th class) for a 25% refund. No refund will be issued for cancellations in the last quarter of the program.
Andrew
Weidenheimer
Andrew is the Director of Security and Privacy at RSM LLP and has close to 15 years of consulting and pentesting experience within the information security, telecommunications, and banking fields. Andrew is also the co-lead for the DC OWASP chapter and has had the privilege of speaking at security conferences including Defcon, OWASP AppSec, and the Rochester Security Summit. Andrew has a degree in computer engineering and holds several certifications, including the CISSP, CISA, and the OSCP. When Andrew is not hacking you can most often find him on the golf course. While not very good, he still enjoys the social aspect of the sport.
Joshua
SCHroeder
At UNC Charlotte, Joshua co-founded the 49th Security Division, a cybersecurity club to train students in offensive and defensive tactics. After graduate school, he led the deployment of several security projects for the Federal Reserve. At FireEye, Josh performed incident response for hundreds of clients, building scripts to perform IR hunting and developing content for its global training program. He now works for a government contractor performing internal Red Teaming and Penetration Testing.
download
Course Overview
Dates and Registration
Instructors
Web Application Hacking
44 hours (24 Teaching, 20 Labs)
Course Overview:
The objective of this course is to teach students the most common and effective attacks for use against web applications. We introduce students to the Open Web Application Security Project (OWASP) Top 10 web vulnerabilities and teach the skills necessary to exploit the most common ones. Students learn how to identify critical application vulnerabilities such as poorly sanitized user input, SQL Injection, Cross Site Scripting (XSS), and XML External Entity Injection (XXE), to name a few. In our virtual lab, students practice finding and exploiting these vulnerabilities to achieve remote code execution as well as access to sensitive data.
Skills and techniques learned in this course include:
- Learning how to find vulnerabilities for exploitation
- Performing practice attacks involving local and remote file inclusion, SQL injection, XSS, and moree
- Understanding the HTTP protocol, the scripting engines and databases behind webservers, and how these components can be abused
- Understanding the OWASP Top 10
- Learning how to identify and exploit critical application vulnerabilities using client proxies such as Burp and Webscarab
- Conducting automated web application scanning using open source tools such as OWASP Zap and Arachni
Live Online, or Self-Paced online:
May 22nd - June 14th, Tuesdays and Thursdays, 7-10PM Eastern
May 15th: Student orientation and test connection to Lab environment.
Tuition:
Tuition for the full course + certificate + CTF + optional career coaching is $2750, payable in full (or three payments of $950). Individual modules are $1,250, payable in full.
Cancellation Policy:
You may cancel your registration to any course for any reason.
Individual Courses
If you cancel before the third class of the eight planned classes, you will receive a full refund. After that, cancellations are subject to a $100 processing fee. You may cancel until the mid-point of the course for a 50% refund, and until the end of the third quarter of the course for a 25% refund. No refund will be issued for cancellations in the last quarter of the course.
Full Program (three courses)
If you cancel before the third class of the twenty-four planned classes, you will receive a full refund. After that, cancellations are subject to a $100 processing fee. You may then cancel until the first quarter of the program (before the end of the 6th class) for a 75% refund, until the mid-point of the program (before the end of the 12th class) for a 50% refund, and until the end of the third quarter of the program (before the end of the 18th class) for a 25% refund. No refund will be issued for cancellations in the last quarter of the program.
Andrew
Weidenheimer
Andrew is the Director of Security and Privacy at RSM LLP and has close to 15 years of consulting and pentesting experience within the information security, telecommunications, and banking fields. Andrew is also the co-lead for the DC OWASP chapter and has had the privilege of speaking at security conferences including Defcon, OWASP AppSec, and the Rochester Security Summit. Andrew has a degree in computer engineering and holds several certifications, including the CISSP, CISA, and the OSCP. When Andrew is not hacking you can most often find him on the golf course. While not very good, he still enjoys the social aspect of the sport.
Joshua
SCHroeder
At UNC Charlotte, Joshua co-founded the 49th Security Division, a cybersecurity club to train students in offensive and defensive tactics. After graduate school, he led the deployment of several security projects for the Federal Reserve. At FireEye, Josh performed incident response for hundreds of clients, building scripts to perform IR hunting and developing content for its global training program. He now works for a government contractor performing internal Red Teaming and Penetration Testing.
Course Overview
Dates and Registration
Instructors
Real World Red Teaming
44 hours (24 Teaching, 20 Labs)
Course Overview:
The objective of this course is to introduce students to more advanced tactics used by modern day adversaries. This course is designed to teach students the skills needed to covertly gain an initial foothold into an organization, establish persistence, and then pivot through machines and move laterally across networks to gain access to sensitive systems. The attacks taught in this course use a smaller footprint to minimize detection by network and host monitoring tools, mimicking techniques used by real world hackers to persist in networks unseen for months, or even years. Students learn the importance of stringing attacks together to access the client’s “crown jewels” and recognize why this is significant to business executives.
Skills and techniques learned in this course include:
- Gaining an initial foothold inside client network via targeted phishing campaigns
- Using weaponized office documents and java applets
- Establishing persistence though undetectable reverse payloads
- Leveraging Powershell to attack modern Active Directory environments
- Pivoting and escalating in a Windows Active Directory domain
- Exploiting Linux services such as Joomla and Mysql
- Establishing covert channels for data exfiltration (i.e. DNS, SSH, etc).
Live Online, or Self-Paced online:
June 26th - July 19th, Tuesdays and Thursdays, 7-10PM Eastern
June 19th: Student orientation and test connection to Lab environment.
Tuition:
Tuition for the full program + certificate + CTF + optional career coaching is $2750, payable in full (or three payments of $950). Individual courses are $1,250, payable in full.
Cancellation Policy:
You may cancel your registration to any course for any reason.
Individual Courses
If you cancel before the third class of the eight planned classes, you will receive a full refund. After that, cancellations are subject to a $100 processing fee. You may cancel until the mid-point of the course for a 50% refund, and until the end of the third quarter of the course for a 25% refund. No refund will be issued for cancellations in the last quarter of the course.
Full Program (three courses)
If you cancel before the third class of the twenty-four planned classes, you will receive a full refund. After that, cancellations are subject to a $100 processing fee. You may then cancel until the first quarter of the program (before the end of the 6th class) for a 75% refund, until the mid-point of the program (before the end of the 12th class) for a 50% refund, and until the end of the third quarter of the program (before the end of the 18th class) for a 25% refund. No refund will be issued for cancellations in the last quarter of the program.
Andrew
Weidenheimer
Andrew is the Director of Security and Privacy at RSM LLP and has close to 15 years of consulting and pentesting experience within the information security, telecommunications, and banking fields. Andrew is also the co-lead for the DC OWASP chapter and has had the privilege of speaking at security conferences including Defcon, OWASP AppSec, and the Rochester Security Summit. Andrew has a degree in computer engineering and holds several certifications, including the CISSP, CISA, and the OSCP. When Andrew is not hacking you can most often find him on the golf course. While not very good, he still enjoys the social aspect of the sport.
Joshua
SCHroeder
At UNC Charlotte, Joshua co-founded the 49th Security Division, a cybersecurity club to train students in offensive and defensive tactics. After graduate school, he led the deployment of several security projects for the Federal Reserve. At FireEye, Josh performed incident response for hundreds of clients, building scripts to perform IR hunting and developing content for its global training program. He now works for a government contractor performing internal Red Teaming and Penetration Testing.
Where is the program taught?
HackEd’s courses are taught live through our lecture portal and are also recorded for self-paced learning. Many of our local events and CTFs are held at 1776, a modern office space overlooking the Potomac River in Crystal City, Arlington, Virginia. There is free parking in the building after 4 and on weekends.
Check out 1776 at www.1776.vc
I don’t live in the DC area. Can I still participate? What is the remote option like?
Certainly. HackEd’s courses are taught live through our lecture portal and are also recorded for self-paced learning. During the course, you’ll be Live with us in two places: through our online learning portal, with audio, video, and chat rooms and also in HackEdLabs, our virtual lab, where you’ll perform the hands-on-keyboard work.
In advance of each course, you’ll receive pre-study resources and the course materials so that you are ready on Day 1. You will also be invited to conduct an orientation session to ensure you are connecting correctly to our infrastructure. You’ll also be assigned to a small study group with your peers, who you will get to know and rely on throughout the course. You’ll have access to instructors and teaching assistants during weekly office hours and through the HackEd course Slack channel. You will continue to have access to your peers through the Slack channel after the course ends.
What kind of materials will I receive?
In addition to the virtual lab access and online learning portal for the Live and recorded lectures, each HackEd course comes with its own set of printed materials. You will receive these in advance in the mail. You’ll also receive a HackEd t-shirt!
Why Arlington, Virginia?
The DC area is home to more cybersecurity talent and resources than any other metropolitan area in the world.
Am I a good fit for the program? What kind of technical experience is helpful?
If you have an understanding of how the internet works and TCP/IP, you’ll be in good shape. IT experience, knowledge of Linux and some experience with scripting are also helpful. After registering, you’ll speak with an instructor to get a sense for your technical background and to make sure you’re heading into the right class.
How much are the courses? Do you offer payment plans? Discounts?
What is your cancellation policy?
Tuition for the full program + certificate + CTF is $2750, payable in full (or three payments of $950). Individual courses are $1,250, payable in full. We offer a 10% discount to veterans, students, government employees and members of the armed services and their spouses.
We offer a generous refund policy. Please refer to the course descriptions above.
Will HackEd help me get a job in the cybersecurity industry?
HackEd is not a job placement agency, but we do have significant ties to the security industry. At the conclusion of the course, we offer a cybersecurity career workshop, mock interviews with industry practitioners, and inclusion in our resume book, which is shared with our 130+ employer partners. If your company is hiring, consider recruiting from HackEd. There are no fees to hire from the program.
What about certifications?
Employers value certifications, but they are concerned that many certified professionals do not have real-world hands-on-keyboard experience. Most employers value a combination of real-world experience and traditional certifications. Many students are also frustrated that most certifications are book-oriented and do not provide a lab environment for practicing new techniques. Upon successful completion of our program, you will earn the HackEd certified Red Teamer Level 1 Certificate, and you will receive a roadmap of subjects to study to earn your CEH, GPEN, and OSCP certifications.
upcoming courses
HackEd is committed to providing the best possible learning experience to our students and a new and creative recruiting approach to our hiring partners.
LEADERSHIP
INSTRUCTORS
JON FERRIS
Co-Founder & CEO
Jon is focused on providing the best possible experience to both program participants and hiring partners alike. Prior to this, Jon co-founded The Data Incubator, a successful data science training program. He managed the company’s expansion and built a talented partnerships team that attracted over 250 hiring partners. Program alumni now work for top companies around the world.
PETER KIM
Co-Founder & CTO
Author of “The Hacker Playbook” series. Peter has worked as a penetration tester and incident responder for the utility, entertainment, financial, and government sectors.” He is passionate about teaching and runs LETHAL, one of the country's largest ethical hacker meetup groups.
JASON CHEN
Co-Founder
and Director of Strategy
Jason is a business strategy consultant, investor, and serial entrepreneur with a passion for companies with a social mission. He is also a Entrepreneur-in-Residence at Techstars and Director for their Startup Next DC program that is supporting early-stage cyber security companies.
Jhanina Santiago
Director,
Employer engagement
Jhanina has a Bachelor’s in Computer Studies from University of Maryland University College, a Certificate of Graduate Studies in Cybersecurity and Intelligence from Salve Regina University and she is also Security+ certified. Her experience in HR/Recruiting and Sales affords her the opportunity to support partners, clients and our participants. Jhanina is also working to be a Certified Ethical Hacker and went through our program in May of 2017. In her free time she likes to hang out with her kids, volunteer and workout. She is also fluent in Spanish.
anvar erkinov
WEB DEVELOPER
Anvar is our talented web developer who makes everything work around here. Between the website, our backend systems, our student portal, and more, we keep him pretty busy. He has a degree in computer engineering and a certificate in digital media. He loves to read and hates to lose at ping pong.
SARA KAPPLER
Director, Admissions
Sara has a background in corporate training projects and operations for global organizations, and is charged with supporting our candidates and participants. Sara is also an avid tech nerd and agile project management supporter. She grew up in Switzerland, is fluent in French and speaks some German.
VLADIMIR MIROSH
GRAPHIC DESIGNER
Vladimir has a background in Design, Typography, and also holds a degree in Applied Maths. He is charged with maintaining the visual style for HackEd as strong, minimalistic, consistent and clean. Vladimir loves fonts and letters and is passionate about bringing a visual chaos in order. When he’s free, Vladimir liks to play videogames. RPG, specifically!
ANDREW
Weidenheimer
Andrew is the Director of Security and Privacy at RSM LLP and has close to 15 years of consulting and pentesting experience within the information security, telecommunications, and banking fields. Andrew is also the co-lead for the DC OWASP chapter and has had the privilege of speaking at security conferences including Defcon, OWASP AppSec, and the Rochester Security Summit. Andrew has a degree in computer engineering and holds several certifications, including the CISSP, CISA, and the OSCP. When Andrew is not hacking you can most often find him on the golf course. While not very good, he still enjoys the social aspect of the sport.
JOSHUA
SCHROEDER
At UNC Charlotte, Joshua co-founded the 49th Security Division, a cybersecurity club to train students in offensive and defensive tactics. After graduate school, he led the deployment of several security projects for the Federal Reserve. At FireEye, Josh performed incident response for hundreds of clients, building scripts to perform IR hunting and developing content for its global training program. He now works for a government contractor performing internal Red Teaming and Penetration Testing.
Outside of work, Joshua writes open source code and has spoken at Defcon, ShmooCon and volunteered for BSides. He competes in wireless CTFs, and his team won the 2017 CTF at ShmooCon. In his spare time he enjoys playing with his dog, remodeling his home, and traveling to new places.
PETER
KIM
Author of “The Hacker Playbook” series. Peter has worked as a penetration tester and incident responder for the utility, entertainment, financial, and government sectors.” He is passionate about teaching and runs LETHAL, one of the country's largest ethical hacker meetup groups.
ARASH
PARSA
Arash Parsa is a self-taught Cyber Security professional with an expertise in web application and network security. He currently holds both the OSCP and OSWP certifications and is working on his OSCE. Arash is also experienced in developing competitive CTF environments and worked as a full stack web developer before obtaining a career in Network Security.
TONY
DOW
Tony Dow is a seasoned Blue Team defender with experience in the government, intelligence community, telecom and gaming industries. He holds a variety of certifications, including several from GIAC, the CISSP, and the Alienvault Certified Security Engineer. In security, Tony is passionate about applying and teaching clear analytical methods. Having built a Security Operations Center from the ground up, Tony has developed HackEd's Alienvault module. In his spare time, Tony likes to enjoy yoga practice and radio controlled aviation.
TOBIAS
MCCURRY
Tobias Mccurry is a top penetration tester, with over over 15 years’ experience in different areas of IT. Tobias specializes in identifying vulnerabilities that have been previously unidentified. He works to lower client risk by evaluating and mitigating critical vulnerabilities. Tobias has published in the SANS Reading Room, Hacker Academy, and the Infosec Institute. He holds a B.S in Computer Science and is pursuing Master of Science in Information Security Engineering with SANS. He maintains multiple industry certifications.
KATIE
STEFANICH
Katie is passionate about stopping evolving cyber threats from thwarting innovation. She has experience in conducting cybersecurity maturity assessments and authoring enterprise-wide incident management strategies. Katie also has extensive experience with startups through Startup Weekend, Techstars, and Booz Allen Hamilton’s Strategic Innovation Group.
COPYRIGHT © 2016 HackEd, ALL RIGHTS RESERVED