Vendor
-
Secure Coding Master Course for Banking and Finance
5 Days
<i>“Money makes the world go round....” </i>– remember? And yes: it is your responsibility to secure all that. As a fintech company you have to take up the challenge, and beat the bad guys with bomb-proof, secure applications!
If there is a domain where security is critical, it is definitely fintech. Vulnerability is not an option if you want to stay a trusted and reliable vendor with systems and applications that certainly comply with PCI-DSS requirements.
Submit an Inquiry
-
Secure Coding Master Course for Telecoms
5 days
Telecommunication is the foundation on which critical infrastructures are built – all modern technologies heavily rely on its security. The continued adoption of IP-based telecommunication and the exposure of telecom equipment opens additional paths for attackers, with a massive increase in security incidents against telecom systems.
Submit an Inquiry
-
Security Engineering on AWS
3 days
In this course, you will learn how to:
Assimilate and leverage the AWS shared security responsibility model
Architect and build AWS application infrastructures that are protected against the most common security threats
Protect data at rest and in transit with encryption
Apply security checks and analyses in an automated and reproducible manner
Submit an Inquiry
-
Security Testing
3 Days
After getting familiar with the vulnerabilities and the attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities. Security testing should start with information gathering about the system (ToC, i.e. Target of Evaluation), then a thorough threat modeling should reveal and rate all threats, arriving to the most appropriate risk analysis-driven test plan.
Submit an Inquiry
-
SharePoint Online, Teams and OneDrive management
1 day
Submit an Inquiry
-
Tenant-to-Tenant migration
1 day
Submit an Inquiry
-
Web Application Security
3 days
As a developer, your duty is to write bulletproof code. However...
What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? What if they could steal away your database and sell it on the black market?
Submit an Inquiry
-
Web Hacking Black Belt Edition
5 Days
This class teaches the audience a wealth of hacking techniques to compromise modern-day web applications, APIs and associated end-points. This class focuses on specific areas of appsec and on advanced vulnerability identification and exploitation techniques. The class allows attendees to learn and practice some neat, new and ridiculous hacks which affected real-life products and have found a mention in real bug-bounty programs.
Submit an Inquiry