CyberSecurity Training Primer for Dev Teams
This is a 1-day security crash course like no other. Traditional and emerging security threats are covered in detail, centered around real-world exploits and case studies.
Application and Network Security Essentials, CyberSecurity Essential Training
- Attack Vectors. Intrusion Prevention, Common Attacks, Social Engineering Attacks
- OWASP Seminar Training Top 10 – Cross Site Scripting , Request Forgery, SQL Injection, Character Encoding, Session Hijacking, Authentication, Authorization loopholes
- Best Practices to Secure your Web Applications – in the Cloud, On-Premises
- Web Services Security
- Securing SOAP and RESTFul Services
- Securing Middleware, EAI and Messaging Systems
- Securing your devops pipeline, including CHEF Servers
- Securing your network, hybrid cloud, VPCs, Subnets, Security Groups
- Identity and Access Management
- IAM in Azure, AWS and Google Cloud
Hardening your Network, Advanced Cyber Security Concepts
- Network level vulnerability scanning tools, Nessus, Nikto, Kali Linux Seminar…
- VPN , IPSec, Internet Gateways Hardening
- Hardware Hardening – Hacking Proxies and Load Balancers , Forward, Reverse Proxies, Tunneling, NATing, VPNs…
Hardening your Applications, Advanced CyberSecurity Training
- Static and Dynamic Code Inspection, Passive and Active Monitoring, Fiddler and Fiddler Watcher, HP WebInspect, HP Fortify
- OWASP Seminar Training Top 10 – Cross Site Scripting , Request Forgery, SQL Injection, Character Encoding, Session Hijacking, Authentication, Authorization loopholes
- Web Services Security
- Securing SOAP and RESTFul Services
- Securing Middleware, EAI and Messaging Systems
- Unified, Secure, Identity and Access Management
- AppSec, Network Security, Compromising Network Proxies and Network/App Load Balancers
- SSL Certificate Interception, Cryptographic Techniques to exploit known secure channels
Real World Case Studies – CyberSecurity, IAM, Network, Enterprise and Corporate Security Workshop
Call today to learn more or to schedule a customized, one-on-one cyber security seminar