-
Secure Coding in PHP
The course provides essential skills for PHP developers necessary to make their applications resistant to contemporary attacks through the Internet.
Submit an Inquiry
-
Secure Coding Master Course for Banking and Finance
<i>“Money makes the world go round....” </i>– remember? And yes: it is your responsibility to secure all that. As a fintech company you have to take up the challenge, and beat the bad guys with bomb-proof, secure applications!
If there is a domain where security is critical, it is definitely fintech. Vulnerability is not an option if you want to stay a trusted and reliable vendor with systems and applications that certainly comply with PCI-DSS requirements.
Submit an Inquiry
-
Secure Coding Master Course for Telecoms
Telecommunication is the foundation on which critical infrastructures are built – all modern technologies heavily rely on its security. The continued adoption of IP-based telecommunication and the exposure of telecom equipment opens additional paths for attackers, with a massive increase in security incidents against telecom systems.
Submit an Inquiry
-
Securing Cisco Net with Snort Rule Writing Best Practices
The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.1 training shows you how to write rules for Snort, an open-source intrusion detection and prevention system. Through a combination of expert-instruction and hands-on practice, this training provides you with the knowledge and skills to develop and test custom rules, standard and advanced rules-writing techniques, integrate OpenAppID into rules, rules filtering, rules tuning, and more.
Submit an Inquiry
-
Securing Cisco Networks with Open Source Snort
The Securing Cisco Networks with Open Source Snort (SSFSNORT) v4 training shows you how to deploy a network intrusion detection system based on Snort. Through a combination of expert instruction and hands-on practice, you will learn how to install, configure, operate, and manage a Snort system. You will also explore rules writing with an overview of basic options, advanced rules writing, how to configure PulledPork, and how to use OpenAppID to provide protection of your network from malware.
Submit an Inquiry
-
Security Engineering on AWS
In this course, you will learn how to:
Assimilate and leverage the AWS shared security responsibility model
Architect and build AWS application infrastructures that are protected against the most common security threats
Protect data at rest and in transit with encryption
Apply security checks and analyses in an automated and reproducible manner
Submit an Inquiry
-
Security Testing
After getting familiar with the vulnerabilities and the attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities. Security testing should start with information gathering about the system (ToC, i.e. Target of Evaluation), then a thorough threat modeling should reveal and rate all threats, arriving to the most appropriate risk analysis-driven test plan.
Submit an Inquiry
-
SharePoint Online, Teams and OneDrive management
Submit an Inquiry
-
Tenant-to-Tenant migration
Submit an Inquiry
-
The Essentials of Webex Calling
Introduce the components that make up the Webex solution, including Webex Meetings, Webex Messaging, and Webex Calling
Introduce the components that make up Webex Calling Control Hub, including analytics, troubleshooting, and reporting
Introduce the Management feature of Webex Control Hub, including how to set it up for a business
Introduce the Services section of the Webex Control Hub, including the Webex Services, Cloud- +Connected Unified Communications Services, and Hybrid Services.
Submit an Inquiry