Sikkerhetskurs for IT
Du har valgt: Bergen


2 dager 14 900 kr
The web is a great software delivery platform, making your software available to users around the world with zero installation and easily deployed updates. [+]
The web is a great software delivery platform, making your software available to users around the world with zero installation and easily deployed updates. Unfortunately, it also exposes you to an army of adversaries - some human, some bot - who have darker goals: to cause loss to your data or reputation, subvert your resources for their own gain or attack your user base. This course helps you to develop a security-oriented mindset. It explores the way the web works, so you have a way to understand how various vulnerabilities arise. Then, with those foundations laid, it covers a range of common and less common vulnerabilities, how an attack based on them would be constructed, and how you can recognize and defend against them.   Day 1Module 1: Developing a security-oriented mindset The economics of security Attack vectors: technical, social, physical Security in depth The issues with security by obscurity Positive vs negative validation Module 2: Analysing HTTP request/response Understanding the HTTP protocol Using a HTTP analyser Request header content Response header content GET vs POST and the implications Assembling and making custom fake requests Tracing an AJAX application's HTTP flow Module 3: Injection vulnerabilities Concept and overall defense strategy SQL injection Path injection HTTP header injection Mail header injection XPATH injection Regex injection Module 4: Attacks from the client side Cross site scripting (XSS) Cross site request forgery (CSRF)   Day 2 Module 5: Authentication and authorization issues Comparing password protection Securing password storage Handling password changes and resets securely Session poisoning and session stealing Direct object reference vulnerabilities Securing static objects Securing AJAX Module 6: Exploiting trust relationships Social engineering basics Phishing Unvalidated re-directs and forwards Weaknesses due to faked referrers Dangers related to shared hosting and shared domains Unicode homograph related issues Module 7: Information leakage The dangers of bad error handling Managing risks in open APIs Timing attacks Module 8: Denial of Service attacks How DoS attacks arise DoS vs DDoS XML poisoning attacks Regex backtracking blow-up attacks   Les mer om Glasspaper as Les mer om kurset: Web Security for Developers [-]
Les mer
5 dager 30 000 kr
Denne MasterClassen består av to MasterClasser - ved å bestille og gjennomføre begge samtidig får du en redusert pris. [+]
MasterClass: Hacking Windows Infrastructure, 2 dagerIn this workshop you will investigate the critical tasks for a high-quality penetration test. Well look at the most efficient ways to map a network and discover target systems and services. Once the systems are discovered, we will search for vulnerabilities and reduce false positives with manual vulnerability verification. At the end we will look at exploitation techniques, including the use of the authored and commercial tools. In the attack summary we will always go through the securing techniques. MasterClass: Securing Windows Infrastructure, 3 dagerThis is a deep dive course on infrastructure services security. It is a must-go for enterprise administrators, security officers and architects.  Delivered by one of the best people in the market in the security field – with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions. The course has a form of intense workshop! [-]
Les mer
Nettkurs 2 timer 13 200 kr
13 Oct
The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cl... [+]
This course is intended for people in the fields of public cloud security and cybersecurity, or for anyone who wants to learn how to secure remote networks and mobile users. Successful completion of this two-day, instructor-led course will help enhance your understanding of how to better protect your applications, remote networks, and mobile users using a SASE implementation. You will get detailed instruction on configuring, managing, and troubleshooting Prisma Access in a production environment.   Target Audience Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Network Engineers    Course Modules 1 - Prisma Access Overview 2 - Planning and Design 3 - Activate and Configure 4 - Security Processing Nodes 5 - Panorama Operations for Prisma Access 6 - Remote Networks 7 - Mobile Users 8 - Tune, Monitor, and Troubleshoot 9 - Manage Multiple Tenants 10 - Next Steps [-]
Les mer

Lukk Denne siden benytter seg av informasjonskapsler (cookies).
Du kan fortsette å bruke siden som vanlig hvis du godtar dette. Les mer om bruk av informasjonskapsler i vår personvernerklæring.