Command Injection
Course | 39 minutes
This course introduces command injection vulnerabilities, their exploitation and possible mitigations.
Secure Design Principles
Course | 39 minutes
Explore the principles behind secure system design, ranging from security models to certification and accreditation.
Secure Software Design
Course | 25 minutes
Explore the methods of creating secure software, including development and maturity models and the secure software development life cycle.
Secure Software Development
Course | 43 minutes
Explore the ins and outs of secure software development as you progress through this nine-video course.
Distributed System & Virtualized Networks
Course | 20 minutes
Dive into risk mitigation strategies and controls with this course on risk scenarios, responses and more.
Cryptography Fundamentals
Course | 41 minutes
Explore the uses and challenges of cryptography. Learn about hashing, ciphers, digital signatures, types of cryptography and more.
Physical Security
Course | 52 minutes
Don’t forget about physical security! Explore how to keep your business secure starting with secure design and construction to physical intrusion detection and more.
Data Center Security
Course | 21 minutes
Don’t let an incident at your data center disrupt your organization. Explore ways to keep data centers secure from a variety of threats.
Network Security Components
Course | 44 minutes
In this course, we help you explore the details of network security components: device types, component management and analyzing components and network configurations.
Securing Host Devices
Course | 20 minutes
Explore the challenges of securing host devices with this course on selecting host hardware and software, host hardening and protecting bootloaders.
Secure Storage Controls
Course | 29 minutes
Refresh your knowledge of secure storage controls with this course on storage types, protocols and management.
Software Vulnerabilities and Security Controls
Course | 37 minutes
In this course, we take you through the fundamentals of software vulnerabilities and security controls.
Identity and Access Management Architecture
Course | 1 hour 23 minutes
Understand the lifecycle and the design of the identity management architecture.
Security Operations Architecture
Course | 1 hour 30 minutes
Know how to design and implement the appropriate architecture for security operations.
Infrastructure Security
Course | 1 hour 29 minutes
Get an overview of various protocols, controls and activities involved in designing infrastructure security
Architecture for Governance, Compliance and Risk Management
Course | 41 minutes
Discover the principles, processes and standards related to GRC (governance, risk management and compliance).
Security Architecture Modeling
Course | 41 minutes
Identify the correct approach for the organization’s security architecture
Architect for Application Security
Course | 34 minutes
Learn about common app-related threats and how to address them through the development lifecycle.
Command Injection
Course | 39 minutes
This course introduces command injection vulnerabilities, their exploitation and possible mitigations.
Secure Design Principles
Course | 39 minutes
Explore the principles behind secure system design, ranging from security models to certification and accreditation.
Secure Software Design
Course | 25 minutes
Explore the methods of creating secure software, including development and maturity models and the secure software development life cycle.
Secure Software Development
Course | 43 minutes
Explore the ins and outs of secure software development as you progress through this nine-video course.
Distributed System & Virtualized Networks
Course | 20 minutes
Dive into risk mitigation strategies and controls with this course on risk scenarios, responses and more.
Cryptography Fundamentals
Course | 41 minutes
Explore the uses and challenges of cryptography. Learn about hashing, ciphers, digital signatures, types of cryptography and more.
Physical Security
Course | 52 minutes
Don’t forget about physical security! Explore how to keep your business secure starting with secure design and construction to physical intrusion detection and more.
Data Center Security
Course | 21 minutes
Don’t let an incident at your data center disrupt your organization. Explore ways to keep data centers secure from a variety of threats.
Network Security Components
Course | 44 minutes
In this course, we help you explore the details of network security components: device types, component management and analyzing components and network configurations.
Securing Host Devices
Course | 20 minutes
Explore the challenges of securing host devices with this course on selecting host hardware and software, host hardening and protecting bootloaders.
Secure Storage Controls
Course | 29 minutes
Refresh your knowledge of secure storage controls with this course on storage types, protocols and management.
Software Vulnerabilities and Security Controls
Course | 37 minutes
In this course, we take you through the fundamentals of software vulnerabilities and security controls.
Identity and Access Management Architecture
Course | 1 hour 23 minutes
Understand the lifecycle and the design of the identity management architecture.
Security Operations Architecture
Course | 1 hour 30 minutes
Know how to design and implement the appropriate architecture for security operations.
Infrastructure Security
Course | 1 hour 29 minutes
Get an overview of various protocols, controls and activities involved in designing infrastructure security
Architecture for Governance, Compliance and Risk Management
Course | 41 minutes
Discover the principles, processes and standards related to GRC (governance, risk management and compliance).
Security Architecture Modeling
Course | 41 minutes
Identify the correct approach for the organization’s security architecture
Architect for Application Security
Course | 34 minutes
Learn about common app-related threats and how to address them through the development lifecycle.