Cybersecurity
Showing 1009–1020 of 1317 results
Secure Software Implementation for CSSLP®
Many application vulnerabilities are the result of coding errors. This course will teach you how to identify and prevent common security vulnerabilities needed for the Certified Secure Software Lifecycle Professional examination.
Secure Software Lifecycle Management for CSSLP®
Software must be designed, built, and operated to be secure throughout its lifecycle. This course will teach you the management of the software development lifecycle needed for the Certified Secure Software Lifecycle examination.
Secure Software Requirements for CSSLP®
Poorly defined requirements is blamed as the cause of many software development project failures. This course will teach you the skills of both function and security requirements gathering needed for the Certified Secure Software Lifecycle examination.
Secure Software Supply Chain for CSSLP®
This course will teach you to identify, assess, and mitigate the risk associated with the software supply chain needed for the Certified Secure Software Lifecycle Professional examination.
Secure Software Testing for CSSLP®
Testing is the last opportunity to prevent vulnerable software from entering production. This course will teach you software testing skills needed for the Certified Secure Software Lifecycle Professional examination.
Secure Software: Deployment and Acquisition
This Free Online Course Includes: 1.5-3 Hours of Learning CPD Accreditation Final Assessment
Secure User Account and Authentication Practices in ASP.NET 3 and ASP.NET Core 3
This course will teach you how to add secure authentication practices to your ASP.NET websites, including proper establishing and storing of passwords, multi-factor authentication, password recovery, and proper authorization techniques..
Secure Your Code – Injections and Logging
This talks shows how to protect against injections and also how to monitor them by combining two of the OWASP top 10 security risks: Injections and insufficient logging & monitoring.
Securely Handling Errors and Logging Security Events in ASP.NET 3 and ASP.NET Core 2
Stop giving malicious users details about your application and track security events in such a way that will enable you to analyze and investigate anomalous activity in your ASP.NET and ASP.NET Core applications.
Securing a Kafka Cluster
This course will teach you how to properly secure your Apache Kafka installation by leveraging its security features.
Securing Access to Microsoft Azure Storage
This course provides detail on the options available to secure the access to data services available in Azure Storage accounts.
Securing Amazon EC2 Instances: AWS Elastic Compute Cloud
Protecting your Amazon EC2 resources using security groups, VPCs, IAM roles, and basic server security best practices