Developing secure web applications to OWASP guidelines.
Train software development teams to avoid the latest security threats.
The trainees will learn to understand the inner workings of common security vulnerabilities and they will learn simple ways to test for particular vulnerabilities. They will understand insecure coding/design patterns – essentially how vulnerable code looks like – and gain the ability to fix it by using patterns and libraries considered industry standard.
The training can be delivered either in the form of a face-to-face 2 day seminar or as an interactive e-learning application (through one of our partners).
Poorly paid IT security staff can be an easy target to corrupt.
The most commonly used port for data exfiltration is port 53.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.