Tour Our Courses
TOUR OUR COURSES
Security Innovation offers over 100 courses to train developers, architects, testers, managers and analysts about secure and resilient development. The intermediate-level course samples below illustrate the type of content, style, and interactivity you’ll experience in our course library.
COD 201 - SECURE C ENCRYPTED NETWORK COMMUNICATIONS
Learn secure communications using Transport Layer Security (TLS) and implementation best practices. Topics include TLS principles, security considerations, libraries, and alternatives.
COD 202 - SECURE C RUN-TIME PROTECTION
Learn common run-time protection technologies (and their limitations) such as Stack security cookies, Address Space Layout Randomization (ASLR), and No-eXecute (NX).
COD 301 - SECURE C BUFFER OVERFLOW MITIGATIONS
Learn good memory management techniques and coding practices to help you avoid buffer & integer overflows, format string vulnerabilities, and race conditions.
COD 282 - JAVA AUTHENTICATION AND AUTHORIZATION SERVICES (JAAS)
Learn about the Java authentication and authorization service (JAAS), components of its framework, and how to define which actions users can perform.
COD 281 - JAVA SECURITY MODEL
Learn how to leverage Java’s policy-driven security model. Topics include Java security model components and functions of the Java security manager and access controller.
COD 302 - SECURE C MEMORY MANAGEMENT MODEL
Learn memory manipulation and allocation techniques. Topics include dynamic memory management and how to ensure “freed” or “deleted” data in memory is no longer accessible.
TOUR OUR COURSES
Security Innovation offers over 100 courses to train developers, architects, testers, managers and analysts about secure and resilient development. The intermediate-level course samples below illustrate the type of content, style, and interactivity you’ll experience in our course library.
COD 201 - SECURE C ENCRYPTED NETWORK COMMUNICATIONS
Learn secure communications using Transport Layer Security (TLS) and implementation best practices. Topics include TLS principles, security considerations, libraries, and alternatives.
COD 202 - SECURE C RUN-TIME PROTECTION
Learn common run-time protection technologies (and their limitations) such as Stack security cookies, Address Space Layout Randomization (ASLR), and No-eXecute (NX).
COD 301 - SECURE C BUFFER OVERFLOW MITIGATIONS
Learn good memory management techniques and coding practices to help you avoid buffer & integer overflows, format string vulnerabilities, and race conditions.
COD 282 - JAVA AUTHENTICATION AND AUTHORIZATION SERVICES (JAAS)
Learn about the Java authentication and authorization service (JAAS), components of its framework, and how to define which actions users can perform.
COD 281 - JAVA SECURITY MODEL
Learn how to leverage Java’s policy-driven security model. Topics include Java security model components and functions of the Java security manager and access controller.
COD 302 - SECURE C MEMORY MANAGEMENT MODEL
Learn memory manipulation and allocation techniques. Topics include dynamic memory management and how to ensure “freed” or “deleted” data in memory is no longer accessible.