Courses

Courses

Attack

SEC542: Web App Penetration Testing and Ethical Hacking

In this intermediate-to-advanced level class, you will learn the art of exploiting web applications so you can find flaws in your enterprise's web apps before the bad guys do. Through detailed, hands-on exercises and training from a seasoned professional, you will be taught the four-step process for web application penetration testing. Inject SQL into back-end databases and learn how attackers exfiltrate sensitive data. Utilize cross-site scripting attacks to dominate a target infrastructure in our unique hands-on laboratory environment. You will also explore various other web app vulnerabilities in-depth with tried-and-true techniques for finding them using a structured testing regimen. By learning the tools and methods of the attacker, you can be a powerful defender.

Learn More

Secure Coding

DEV536: Secure Coding: Developing Defensible Applications

Throughout the course we will look at examples of the types of flaws that secure coding protects against, examine how the flaw might be exploited and then focus on how to correct that code. Coupled with the lectures, there are more than ten hands on exercises where the students will have the opportunity to test out their new skills identifying flaws in code, fixing code and writing secure code.

Learn More

DEV541: Secure Coding in Java/JEE: Developing Defensible Applications

This is a comprehensive course covering a huge set of skills and knowledge. It is not a high-level theory course. It is about real programming. In this course you will examine actual code, work with real tools, build applications, and gain confidence in the resources you need for the journey to improving the security of Java applications.

Learn More

DEV543: Secure Coding in C & C++

Even though C and, to a lesser extent, C++ are well understood languages, the flexibility of the language and inconsistencies in the standard C libraries have led to an enormous number of discovered vulnerabilities over the years. The unfortunate truth is that there are probably more undiscovered vulnerabilities than there are known vulnerabilities!

Learn More

DEV544: Secure Coding in .NET: Developing Defensible Applications

Rather than focusing on traditional web attacks from the attacker's perspective, this class will show developers first how to think like an attacker, and will then focus on the latest defensive techniques specific to the ASP.NET environment. The emphasis of the class is a hands-on examination of the practical aspects of securing .NET applications during development.

Learn More

Other

HOSTED: (ISC)2® Certified Secure Software Lifecycle Professional (CSSLP®) CBK® Education Program

The (ISC)2 5-day CSSLP CBK Education Program is the exclusive way to learn security best practices and industry standards for the software lifecycle - critical information to a CSSLP. This is where you will learn tools and processes on how security should be built into each phase of the software lifecycle. It will also detail security measures that need to take place beginning with the requirement phase, through software design all the way through software testing and ultimately disposal.

Learn More