Role-Based Program
Our Role-Based courses deliver focused security training for technical and high-risk roles such as IT, developers, and system administrators. These courses dive deeper into topics like infrastructure hardening, application security, and incident response so specialists can better protect your environment.
All Role-Based Program 41 Results
Software & Data Integrity Failures is a critical category in the OWASP Top 10:2021, highlighting the risks of unauthorised changes to software and data. This course explains what these failures are, why they occur, and the impact they can have on web application security. Learners will develop a shared understanding of secure development practices and gain practical skills to identify, prevent, and address integrity vulnerabilities, including implementing integrity checks and secure update mechanisms. Coding examples are provided using the Python programming language.
Implement secure design practices and address common Insecure Design vulnerabilities when developing web applications, as outlined in the OWASP Top 10:2021.
Implement secure design practices and address common Insecure Design vulnerabilities when developing web applications, as outlined in the OWASP Top 10:2021.
Gain the knowledge and practical skills necessary to effectively implement security logging and monitoring mechanisms, and address related failures when developing web applications.
Gain the knowledge and practical skills necessary to effectively implement security logging and monitoring mechanisms, and address related failures when developing web applications.
Open Worldwide Application Security Project (OWASP) is a non-profit organisation that works to improve security of software globally. During this learning, you will explore OWASP, it's value and the Top 10 vulnerabilities.
Gain the knowledge and practical skills necessary to implement secure design practices and address common Insecure Design vulnerabilities when developing web applications, as outlined in the OWASP Top 10:2021.
Gain the knowledge and practical skills necessary to implement secure design practices and address common Insecure Design vulnerabilities when developing web applications, as outlined in the OWASP Top 10:2021.
In this course, you will gain the knowledge and practical skills necessary to effectively identify and address Injection vulnerabilities when developing web applications, as outlined in the OWASP Top 10:2021.
In this course, you will gain the knowledge and practical skills necessary to effectively identify and address Injection vulnerabilities when developing web applications, as outlined in the OWASP Top 10:2021.
Identification & Authentication Failures is a key category in the OWASP Top 10:2021, highlighting the challenges of implementing secure user authentication and session management. This course explains what these failures are, why they occur, and the potential impact on web application security. Learners will gain practical skills to identify, prevent, and address authentication vulnerabilities, including implementing secure authentication mechanisms. Coding examples are presented in pseudocode.
Identification & Authentication Failures is a key category in the OWASP Top 10:2021, highlighting the challenges of implementing secure user authentication and session management. This course explains what these failures are, why they occur, and the potential impact on web application security. Learners will gain practical skills to identify, prevent, and address authentication vulnerabilities, including implementing secure authentication mechanisms. Coding examples are provided using Python.
Get expert guidance to match your people with the right awareness training for maximum impact.
Sort by