Available courses

In order to secure develop web applications and websites, it is necessary to understand the underlying technologies. In order to assess risk posture, it is crucial to see these systems from the same perspective as the attackers. Attackers leverage deep knowledge of complex technology to achieve their goals; the defenders need to be similarly equipped. This training session will provide an overview how to build, harden, and assess web applications so that they can be proactive in taking appropriate measures to mitigate threats against their information systems. 

Welcome to the Role-Based Security Training for System Administrators. This training will cover security requirements based on your role as the System Administrator.

Welcome to the Role-Based Security Training for Network Administrators. This training will cover security requirements based on your role as the Network Administrator.

Welcome to the Role-Based Security Training for Database Administrators. This training will cover security requirements based on your role as the Database Administrator.