Security passes from the formation of human resources

Through the partnership with “security innovation”, we organize courses on cyber security that transfer the know-how necessary to comply with internal rules and legislation in relation to security issues to the staff of the companies and thus have qualified internal staff able to cope with emergencies independently.

Interactive Mode

Each course is realized with an interactive multimedia technique and is equipped with spoken audio. It includes a final test to understand the topics and a certificate of participation.

SECURITY ENGINEERING

Microsoft SDL for managers

SDLC Gap Analysis & Remediation Techniques

How tocreate Application Security Design Requirements

How to create an Application Security Threat Model

Attack Surface Analysis & Reduction

How to perform a Security Code Review

How to create an Application Security Threat Model for Embedded Systems

Attack Surface Analysis & Reduction for Embedded Systems

Performing Secure Code Review for Embedded Systems

CPSSE Certification Test Prep

SECURE SW DESIGN

Foundamentals of Secure Architecture

Architecture Risk Analysis & Remediation

Security Tools and Technology

OWASP Top 10 Threat Mitigation

Architecture Risk & Analysis for Embedded Systems

Introduction to Cryptography

Creating Secure Application Architecture

Secure Application Architecture for Embedded Systems

SECURE CODING

Secure Application Architecture for Embedded Systems

Foundamentals of Secure Database Development

Foundamentals of Web 2.0 Security

Creating Secure Code: Windows Foundation

Creating secure Code – .NET Framework Foundation

Creating Secure Code: Oracle Foundation

Creating Secure ASP.NET Code

Creating Secure C# Code

Buffer Overflow – Attacks & Countermeasures

SECURITY TESTING

Foundamentals of Security Testing

Classes of Security Defects

How to test the OWASP Top Ten

Advanced Software Security Testing

Exploiting buffer Overflows

Advanced Security testing for Embedded Systems