Fundamentals of Security Testing
This course introduces security testing concepts that help students analyze an application from a security perspective.
Fundamentals of Security Testing for IoT Embedded Systems
This course provides additional security testing training of particular importance to IoT embedded software engineers.
Testing for CWE SANS Top 25 Software Errors
In this course, you will learn how to identify and mitigate each of the CWE's 25 Most Dangerous Software Errors. Coverage includes techniques for spotting common security issues through code review and testing. Secure coding best practices are included for each security defect, as well as descriptions of technology specific weaknesses. Upon completion of this course, you will be able to identify common security defects and their potential impact to your application. You will also be able to identify specific types of security vulnerabilities associated with different technologies. Finally, you will be able to apply the steps necessary to avoid, detect, and mitigate common types of security defects in your applications. The course includes Knowledge Checks, Module Summaries, and information about additional online resources.
How to Test for the OWASP Top 10
This course is critical to know how to test for the OWASP Top Ten.
Classes of Security Defects - IoT Embedded Systems
This course provides additional training on Classes of Security Defects pertaining to IoT embedded software engineers.
Advanced Software Security Testing - Tools and Techniques
This course delves deeply into the techniques for testing specific security weaknesses.
Exploiting Buffer Overflows
This course provides students with the required information to help understand and mitigate buffer overflow exploits.
IoT Advanced Embedded Software Security Testing
This course module provides additional Software Security Testing of particular importance to IoT embedded software engineers.
Advanced Web Application Security Testing
This Instructor-Led course examines many important web vulnerabilities like HTML5 attacks, business logic attacks, web services attacks, and AJAX/JSON specific vulnerabilities and issues.