Training Type
Language
Filtered By:
DES 101

Fundamentals of Secure Architecture

In this course, students will examine the state of the industry from a security perspective.

E-Learning English
DES 201

(Coming Soon) Fundamentals of Cryptography Series

In this series, you will learn basic concepts of cryptography and common ways that it is applied, from the perspective of application development. You will learn the importance of randomness; the roles of encoding, encryption, and hashing; the concepts of symmetric and asymmetric encryption; the purpose of cryptographic keys; and the roles of message authentication codes (MACs) and digital signatures. In addition, you'll be introduced to key management, digital certificates, and the public key infrastructure (PKI).

E-Learning English
DES 202

(Coming Soon) Cryptographic Suite Services: Encoding, Encrypting and Hashing

In this series, you will learn basic concepts of cryptography and common ways that it is applied, from the perspective of application development. You will learn the importance of randomness; the roles of encoding, encryption, and hashing; the concepts of symmetric and asymmetric encryption; the purpose of cryptographic keys; and the roles of message authentication codes (MACs) and digital signatures. In addition, you'll be introduced to key management, digital certificates, and the public key infrastructure (PKI).

E-Learning English
DES 203

(Coming Soon) Cryptographic Components: Randomness, Algorithms, and Key Management

This course introduces the common components of cryptographic systems including random number generation, algorithms to perform cryptographic manipulation of information, cryptographic keys, and a mechanism to manage and distribute cryptographic keys. This course coverage aligns with the National Initiative for Cybersecurity Education (NICE) requirements K0018: Knowledge of encryption algorithms, andK0019: Knowledge of cryptography and cryptographic key management concepts.

E-Learning English
DES 204

(Coming Soon) The Role of Cryptography in Application Development

This course introduces cryptography and how cryptography can help secure applications and data. It also provides an overview of common uses of cryptography. After completing this course, you will be able to identify the various cryptographic technologies that are relevant to software solutions. You will also be able to identify several common data-in-motion cryptographic security applications, and identify several common data-at rest cryptographic security applications.

E-Learning English
DES 205

(Coming Soon) Message Integrity Crytographic Functions

This course introduces cryptography and how cryptography can help secure applications and data. It also provides an overview of common uses of cryptography. After completing this course, you will be able to identify the various cryptographic technologies that are relevant to software solutions. You will also be able to identify several common data-in-motion cryptographic security applications, and identify several common data-at rest cryptographic security applications.

E-Learning English
DES 212

Architecture Risk Analysis and Remediation

This course defines techniques for analyzing the architecture/design of a software system for security flaws.

E-Learning English
DES 213

Designing Secure Enterprise Infrastructure Series

In this series, you will learn about the importance of designing and implementing secure access controls across the enterprise infrastructure. You will also learn about the techniques used to identify system security and performance requirements, develop appropriate security architecture, select the correct mitigations, and develop policies that can ensure the secure operation of your systems.

E-Learning English
DES 214

Securing Network Access

In this course, you will learn about how Network Access Control can be used to secure systems on a network.

E-Learning English
DES 215

Securing Operating Systems

In this course, you will learn about common operating system threats and how to best mitigate those threats.

E-Learning English
DES 216

Securing Cloud Instances

In this course, you will learn about the top threats to Cloud resources and how to mitigate them using application security best practices.

E-Learning English
DES 217

Application, Technical and Physical Access Controls

In this course, you will learn about the risks associated with data breaches and how to implement strong access controls and security policies that protect applications, systems and sensitive data.

E-Learning English
DES 221

OWASP 2017 Series

The primary objective of this series of courses, and of the OWASP Top 10, is to educate developers, designers, architects, managers, and organizations about the consequences of the most common and most important web application security weaknesses.

E-Learning English
DES 222

Mitigating Injection

In this course, you will learn how to mitigate the risks associated with injection.

E-Learning English
DES 223

Mitigating Broken Authentication

In this course, you will learn how to mitigate the risks associated with broken authentication.

E-Learning English
DES 224

Mitigating Sensitive Data Exposure

In this course, you will learn how to mitigate the risks associated with sensitive data exposure.

E-Learning English
DES 225

Mitigating XML External Entities

In this course, you will learn how to mitigate the risks associated with XML External Entities (XXE).

E-Learning English
DES 226

Mitigating Broken Access Control

In this course, you will learn how to mitigate the risks associated with broken access control.

E-Learning English
DES 227

Mitigating Security Misconfiguration

In this course, you will learn how to mitigate the risks associated with security misconfiguration.

E-Learning English
DES 228

Mitigating Cross Site Scripting (XSS)

In this course, you will learn how to mitigate the risks associated with Cross-Site Scripting (XSS).

E-Learning English
DES 229

Mitigating Insecure Deserialization

In this course, you will learn how to mitigate the risks associated with insecure deserialization .

E-Learning English
DES 230

Mitigating Use of Components with Known Vulnerabilities

In this course, you will learn how to mitigate the risks associated with using components with known vulnerabilities.

E-Learning English
DES 231

Mitigating Insufficient Logging & Monitoring

In this course, you will learn how to mitigate the risks associated with insufficient logging and monitoring.

E-Learning English
NEW
DES 260

Fundamentals of IoT Architecture and Design

This course focuses on topics in architecting and designing a secure Internet of Things (IoT) system, with emphasis on an embedded IoT device and itsrelationship with the cloud. Topics discussed range from what should be reviewed and defined in the requirements phase to authorization considerations within the IoT device and cloud.This course presents the following subjects:

E-Learning English
NEW
DES 311

Creating Secure Application Architecture

This course covers key principles used to increase security of application architecture and design.

E-Learning English
DES 352

Creating Secure OTA (Over the Air) Automotive System Updates

In this course, participants will learn about the secure design considerations for over-the-air (OTA) updates for automotive systems.

E-Learning English
DES 721

OWASP Top Ten - Threats and Mitigations

This Instructor-Led course introduces students to OWASP and the Top 10 Project, and covers in detail each of the OWASP Top 10 Web Application Vulnerabilities.

Live Training English
DES 722

CWE/SANS Top 25 - Threats & Mitagations

This Instructor-Led course covers in detail the CWE/SANS Top 25 Most Dangerous Programming Errors, which comprises weaknesses in all types of software applications.

Live Training English
DES 811

Secure Architecture and Design

This Instructor-Led course addresses this gap by allowing students to use their own software application in lab-based exercises.

Live Training English
Sorry, there are no courses that meet these specifications.