Tour Our Courses
Rated 3.5/5 based on 11 customer reviews

Tour Our Courses

Available: In Stock
$0.00

Image

TOUR OUR COURSES

Security Innovation offers over 100 courses to train developers, architects, testers, managers and analysts about secure and resilient development. The intermediate-level course samples below illustrate the type of content, style, and interactivity you’ll experience in our course library.

COD 201 - SECURE C ENCRYPTED NETWORK COMMUNICATIONS

Learn secure communications using Transport Layer Security (TLS) and implementation best practices. Topics include TLS principles, security considerations, libraries, and alternatives.

COD 202 - SECURE C RUN-TIME PROTECTION

Learn common run-time protection technologies (and their limitations) such as Stack security cookies, Address Space Layout Randomization (ASLR), and No-eXecute (NX).

COD 301 - SECURE C BUFFER OVERFLOW MITIGATIONS

Learn good memory management techniques and coding practices to help you avoid buffer & integer overflows, format string vulnerabilities, and race conditions.

COD 282 - JAVA AUTHENTICATION AND AUTHORIZATION SERVICES (JAAS)

Learn about the Java authentication and authorization service (JAAS), components of its framework, and how to define which actions users can perform.

COD 281 - JAVA SECURITY MODEL

Learn how to leverage Java’s policy-driven security model. Topics include Java security model components and functions of the Java security manager and access controller.

COD 302 - SECURE C MEMORY MANAGEMENT MODEL

Learn memory manipulation and allocation techniques. Topics include dynamic memory management and how to ensure “freed” or “deleted” data in memory is no longer accessible.

TOUR OUR COURSES

Security Innovation offers over 100 courses to train developers, architects, testers, managers and analysts about secure and resilient development. The intermediate-level course samples below illustrate the type of content, style, and interactivity you’ll experience in our course library.

COD 201 - SECURE C ENCRYPTED NETWORK COMMUNICATIONS

Learn secure communications using Transport Layer Security (TLS) and implementation best practices. Topics include TLS principles, security considerations, libraries, and alternatives.

COD 202 - SECURE C RUN-TIME PROTECTION

Learn common run-time protection technologies (and their limitations) such as Stack security cookies, Address Space Layout Randomization (ASLR), and No-eXecute (NX).

COD 301 - SECURE C BUFFER OVERFLOW MITIGATIONS

Learn good memory management techniques and coding practices to help you avoid buffer & integer overflows, format string vulnerabilities, and race conditions.

COD 282 - JAVA AUTHENTICATION AND AUTHORIZATION SERVICES (JAAS)

Learn about the Java authentication and authorization service (JAAS), components of its framework, and how to define which actions users can perform.

COD 281 - JAVA SECURITY MODEL

Learn how to leverage Java’s policy-driven security model. Topics include Java security model components and functions of the Java security manager and access controller.

COD 302 - SECURE C MEMORY MANAGEMENT MODEL

Learn memory manipulation and allocation techniques. Topics include dynamic memory management and how to ensure “freed” or “deleted” data in memory is no longer accessible.