Dev Team Training

Agile Teams

Is your team considering moving towards Agile? Is your team already Agile, but not reaping the full benefits yet?

Does your cloud deployment model (devops) strategy include Agile?

Anuj has been a practicing Agile Technology Architect for the past 15 years. Here are some ways in which he can bring your team producing Agile code in under a day..

  • Quick Recap of Agile – Compare/contrast Scrum, Agile and Kanban techniques
  • Sprint Planning and Tracking , Release Planning and Tracking
  • Scrum Roles and Artifacts , Scrum Program Management
  • Distributed Agile Teams, Distributed Scrum Teams
  • Release Planning for Multiple, connected Projects
  • Planning Hybrid Projects
  • Scaled Agile Framework (SAFe) – Deep Dive
  • Enterprise Architecture (TOGAF, Zachman) versus SAFe

As a certified cloud architect, Anuj brings a unique perspective on Agile development and deployment in the context of AWS and Azure.

Secure Teams ( Cyber Attack Prevention and Best Practices )

This is a 1-day cyber security and corporate security crash course like no other. Traditional and emerging security threats are covered in detail, centered around real-world exploits and case studies.

  • Attack Vectors.  Intrusion Prevention, Common Attacks, Social Engineering Attacks
  • OWASP Cyber Security Top 10 – Cross Site Scripting , Request Forgery, SQL Injection, Character Encoding, Session Hijacking, Authentication, Authorization loopholes
  • Internet and Intranet Cybersecurity – Best Practices to Secure your Web Applications –  in the Cloud, On-Premises
  • Web Services Security
    • Securing SOAP and RESTFul Services
    • Securing Middleware, EAI and Messaging Systems
    • Securing your devops pipeline, including CHEF Servers
    • Securing your network, hybrid cloud, VPCs, Subnets, Security Groups
    • Identity and Access Management
  • Identiy and Access Management best practices, IAM in Azure, IAM in AWS, Integration with ADFS, Azure Identity Manager and more…
    • IAM can be your most powerful weapon and also your most vulnerable area when it comes to cyber security.

  • Static and Dynamic Code Inspection, Passive and Active Monitoring, Fiddler and Fiddler Watcher, HP WebInspect, HP Fortify
  • Network level vulnerability scanning tools, Nessus, Nikto, Kali Linux for penetration testing ( pentesting )
  • Hacking Proxies and Load Balancers , Hacking Forward, Reverse Proxies, Tunneling, NATing, VPNs…Securing Network Assets from cyberattacks

  • Compromising Network Proxies and Network/App Load Balancers
  • Cryptography
    • Overview, Types of Cryptography
    • SSL Certificate Interception
    • Cryptographic Techniques to exploit known secure channels

Call today to learn more or to schedule a customized, agile team or cybersecurity team training session.