New Functionality
Challenge V2 beta available for playtest in Explore
We are completely overhauling our Challengeplayer, and we want your feedback! There are 17 example pieces of content in the V2 Challenge player available in Explore, and a filter to make it easy to find them. This content is clearly marked as "beta" content.
New Course Templates
NIS2
This NIS2 training course covers practical topics such as supply chain security, cryptography, encryption, and multi-factor authentication. It also touches on essential requirements like network security, risk management, incident handling, and vulnerability management.
Overview of Application Security Testing
This course offers a high-level overview of application security testing, covering SAST, DAST, and Penetration Testing. Learn key tools, techniques, and how to interpret results to identify and mitigate vulnerabilities in applications.
OWASP Top 10 CI/CD
This conceptual course covers the OWASP top 10 CI/CD in depth with 10 brand new guidelines, available with specific examples and coverage for GitHub Actions, Jenkins Declarative, and Jenkins Scripted.
MISRA for C Embedded
This course covers MISRA compliance, focusing on decidability, type safety, and undefined behaviors. Learn best practices for memory safety and strategies to avoid common pitfalls in secure programming. Includes 12 new C Embedded challenges.
Secure Implementation of Containerized Cloud Infrastructure
This course focus on the ins and outs of building a modern cloud infrastructure capable of taking containers from a developer's computer to production in a secure manner.
Fundamentals of iOS
This course covers a wide range of topics, from the architecture and security features of the iOS operating system to the intricacies of app development and deployment.
Secure Programming for iOS
Learn defensive programming techniques to mitigate iOS application risks, with a focus on using key platform security controls effectively.
Introduction to Cloud Security
This course explores secure cloud infrastructures, focusing on data protection, identity management, compliance, and securing containerized and serverless environments. Through theory and hands-on examples across AWS, Azure, and GCP, participants will gain skills to design and maintain secure cloud solutions for evolving challenges.
Securing Infrastructure as Code
This course covers a wide range of topics, from the architecture and security features of the iOS operating system to the intricacies of app development and deployment.
Kubernetes Security
This course is designed to familiarize you with the main components of Kubernetes architecture, and deliver an understanding of its attack surface and associated risks.
Securing Amazon Web Services
This course offers a comprehensive overview of AWS security, covering cloud security, compliance, infrastructure and application security, identity and data management, and incident response.
Securing Microsoft Azure
This course explores the ins and outs of securing software built and deployed on the Microsoft Azure cloud platform. Learn how to use Azure-specific features to ensure your application's production data is adequately protected and monitored.
Securing Google Cloud Platform
This course guides you in building and operating a secure environment in Google Cloud Platform, covering security features and services to protect your infrastructure and data. By the end, you'll be able to set up a secure GCP infrastructure for deploying cloud-native applications and services.
Introduction to AI Risk & Security
This beginner course introduces AI risk and security for developers and technical professionals, covering key concepts, risk assessment, mitigation strategies, and resilience. It also emphasizes AI governance and accountability.
Foundations of COBOL Security
This course explores COBOL system risks, debunks security myths, and examines vulnerabilities. It covers best practices and strategies to mitigate security issues.
Introduction to Securing the Internet of Things
This course explores IoT complexities and security challenges, focusing on privacy and vulnerabilities. It provides the knowledge needed to make informed decisions as an IoT vendor, enterprise, or consumer.
Comments
0 comments
Please sign in to leave a comment.