Role-Based Program

Our Role-Based courses deliver focused security training for technical and high-risk roles such as IT, developers, and system administrators. These courses dive deeper into topics like infrastructure hardening, application security, and incident response so specialists can better protect your environment.

All Role-Based Program 41 Results

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP Software & Data Integrity Failures (Python Version) Role-Based Program

Software & Data Integrity Failures is a critical category in the OWASP Top 10:2021, highlighting the risks of unauthorised changes to software and data. This course explains what these failures are, why they occur, and the impact they can have on web application security. Learners will develop a shared understanding of secure development practices and gain practical skills to identify, prevent, and address integrity vulnerabilities, including implementing integrity checks and secure update mechanisms. Coding examples are provided using the Python programming language.

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP Security Misconfiguration (Pseudocode Version) Role-Based Program

Implement secure design practices and address common Insecure Design vulnerabilities when developing web applications, as outlined in the OWASP Top 10:2021.​

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP Security Misconfiguration Role-Based Program

Implement secure design practices and address common Insecure Design vulnerabilities when developing web applications, as outlined in the OWASP Top 10:2021.​

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP Security Logging & Monitoring Failures (Pseudocode Version) Role-Based Program

Gain the knowledge and practical skills necessary to effectively implement security logging and monitoring mechanisms, and address related failures when developing web applications.

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP Security Logging & Monitoring Failures Role-Based Program

Gain the knowledge and practical skills necessary to effectively implement security logging and monitoring mechanisms, and address related failures when developing web applications.

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP Overview Role-Based Program

Open Worldwide Application Security Project (OWASP) is a non-profit organisation that works to improve security of software globally. During this learning, you will explore OWASP, it's value and the Top 10 vulnerabilities.

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP Insecure Design (Pseudocode Version) Role-Based Program

Gain the knowledge and practical skills necessary to implement secure design practices and address common Insecure Design vulnerabilities when developing web applications, as outlined in the OWASP Top 10:2021.​

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP Insecure Design Role-Based Program

Gain the knowledge and practical skills necessary to implement secure design practices and address common Insecure Design vulnerabilities when developing web applications, as outlined in the OWASP Top 10:2021.​

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP Injection (Pseudocode Version) Role-Based Program

In this course, you will gain the knowledge and practical skills necessary to effectively identify and address Injection vulnerabilities when developing web applications, as outlined in the OWASP Top 10:2021.

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP Injection Role-Based Program

In this course, you will gain the knowledge and practical skills necessary to effectively identify and address Injection vulnerabilities when developing web applications, as outlined in the OWASP Top 10:2021.

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP Identification & Authentication Failures (Pseudocode Version) Role-Based Program

Identification & Authentication Failures is a key category in the OWASP Top 10:2021, highlighting the challenges of implementing secure user authentication and session management. This course explains what these failures are, why they occur, and the potential impact on web application security. Learners will gain practical skills to identify, prevent, and address authentication vulnerabilities, including implementing secure authentication mechanisms. Coding examples are presented in pseudocode.

Course Image IT Security
Course Image IT Security
CyberSecureIT: OWASP Identification & Authentication Failures (Python Version) Role-Based Program

Identification & Authentication Failures is a key category in the OWASP Top 10:2021, highlighting the challenges of implementing secure user authentication and session management. This course explains what these failures are, why they occur, and the potential impact on web application security. Learners will gain practical skills to identify, prevent, and address authentication vulnerabilities, including implementing secure authentication mechanisms. Coding examples are provided using Python.

Before Image
Not sure which course fits your team?

Get expert guidance to match your people with the right awareness training for maximum impact.

Get Personalised Advice

Sort by

Phriendly Phishing Logo