Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
1. Types of security tests and their role in the security of the organization
- Infrastructure tests Application tests in the development process Penetration tests of applications APT tests Configuration tests
2. Designing security processes
- Responsibilities Examples of process construction Supporting tools Risk valuations The most common problems
3. Infrastructure tests
- Inventory vs auto-discovery Examples of tools Reducing the number of false-positives The most common problems
4. Application tests in the development process
- Code repository security Static code scanning Design patterns
5. Application Penetration Testing
- Pentest application selection criteria Types of pentests Threat modeling Pentest preparation Evaluation of the report
6. Testy APT (Advanced Persistent Threat)
- Types of APT tests and their purposes Advantages and disadvantages of APT tests Preparation of the APT test - what to remember.
7. Configuration tests
- Security standards for technology Sample tools
14 Hours
Testimonials (5)
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
A wide range of knowledge of the lecturer.
Marcin Szklarski - Santander Consumer Bank
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
Lot's of information explained very well. Good examples, interesting exercises. Trainer showed us his real world experience.