jagomart
digital resources
picture1_Course List 2017


 185x       Filetype PDF       File size 0.14 MB       Source: web.securityinnovation.com


File: Course List 2017
security innovation technical security training secure coding security engineering awa 101 fundamentals of application security eng 105 integrating microsoft ms sdl into your sdlc cod 101 fundamentals of secure development ...

icon picture PDF Filetype PDF | Posted on 07 Feb 2023 | 2 years ago
Partial capture of text on file.
                                                                                                                     SECURITY 
                                                                                                                     INNOVATION
      TECHNICAL SECURITY TRAINING
       SECURE CODING                                                        SECURITY ENGINEERING
       AWA 101. Fundamentals of Application Security                        ENG 105. Integrating Microsoft MS SDL into your SDLC
       COD 101. Fundamentals of Secure Development                          ENG 211. How to Create Application Security Design Requirements
       COD 110. Fundamentals of Secure Mobile Development                   ENG 301. How to Create an Application security Threat Model
       COD 141. Fundamentals of Secure Database Development                 ENG 311. Attack Surface Analysis & Reduction
       COD 152. Fundamentals of Secure Cloud Development                    ENG 312. How to Perform a Security Code Review
       COD 153. Fundamentals of Secure AJAX Code                            ENG 352. How to Create an Automotive Systems Threat Model
       COD 160. IoT Embedded Systems Security - Fundamentals of             ENG 391. IoT Embedded Systems Security - How to Create an 
                         Secure Software Development                                         Application Security Threat Model
       COD 170. Threats to COBOL and Mainframe Software Security            ENG 392. IoT Embedded Systems Security - Attack Surface Analysis 
       COD 190. IoT Embedded Systems Security - Fundamentals of                              and Reduction
                        Secure Mobile Development                           ENG 393. IoT Embedded Systems Security - How to Perform a 
       COD 211. Creating Secure Code - Java Foundations                                      Security Code Review
       COD 212. Creating Secure Code - C/C++ Foundations
       COD 215. Creating Secure Code - .NET Framework Foundations           SECURE DESIGN
       COD 219. Creating Secure Code - SAP ABAP Foundations                 DES 101. Fundamentals of Secure Architecture
       COD 222. PCI DSS v3.1 Best Practices for Developers                  DES 201. Fundamentals of Cryptography
       COD 251. Creating Secure AJAX Code – ASP.NET Foundations             DES 212. Architecture Risk Analysis and Remediation
       COD 252. Creating Secure AJAX Code – Java Foundations                DES 213. Introduction to Security Tools & Technologies
       COD 253. Creating Secure Cloud Code - AWS Foundations                DES 221. OWASP Top 10 – Threats & Mitigations
       COD 254. Creating Secure Cloud Code - Azure Foundations              DES 292. IoT Embedded Systems Security - Architecture Risk 
       COD 255. Creating Secure Code - Web API Foundations                                   Analysis & Remediation
       COD 256. Creating Secure Code – Ruby on Rail Foundations             DES 311. Creating Secure Application Architecture 
       COD 257. Creating Secure Python Web Applications                     DES 352.Creating Secure OTA Automotive System Updates
       COD 270. Creating Secure COBOL and Mainframe Applications            DES 391. IoT Embedded Systems Security - Creating Secure  
       COD 292. IoT Embedded Systems Security - Creating Secure Code                         Application Architecture
                         – C/C++ Foundations
       COD 311. Creating Secure ASP.NET Code                                SECURITY TESTING  
       COD 312. Creating Secure C/C++ Code                                  TST 101. Fundamentals of Security Testing
       COD 313. Creating Secure Java Code                                   TST 191. IoT Embedded Systems Security - Fundamentals of  
       COD 314. Creating Secure C# Code                                                     Security Testing
       COD 315. Creating Secure PHP Code                                    TST 201. Classes of Security Defects
       COD 317. Creating Secure iPhone Code in Objective-C                  TST 291. IoT Embedded Systems Security - Classes of Security
       COD 318. Creating Secure Android Code in Java                                        Defects
       COD 351. Creating Secure HTML5 Code                                  TST 211. How to Test for the OWASP Top 10
       COD 352. Creating Secure jQuery Code                                 TST 401. Advanced Software Security Testing – Tools & 
       COD 392. IoT Embedded Systems Security - Creating Secure                             Technologies
                        C/C++ Code                                          TST 411. Exploiting Buffer Overflows
       COD 411. Integer Overflows - Attacks & Countermeasures               TST 491. IoT Embedded Systems Security - Advanced Software 
       COD 412. Buffer Overflows - Attacks & Countermeasures                               Security Testing
                                            www.securityinnovation.com/contact     |     978.694.1008    |    @SecInnovation              
The words contained in this file might help you see if this file matches what you are looking for:

...Security innovation technical training secure coding engineering awa fundamentals of application eng integrating microsoft ms sdl into your sdlc cod development how to create design requirements mobile an threat model database attack surface analysis reduction cloud perform a code review ajax automotive systems iot embedded software threats cobol and mainframe creating java foundations c net framework sap abap des architecture pci dss v best practices for developers cryptography asp risk remediation introduction tools technologies aws owasp top mitigations azure web api ruby on rail python applications ota system updates testing tst php classes defects iphone in objective android html test the jquery advanced exploiting buffer overflows integer attacks countermeasures www securityinnovation com contact secinnovation...

no reviews yet
Please Login to review.