
Improve Your Understanding and Skills
Gain The Knowledge You Need to Keep Your Company Safe From Malicious Attacks and Data Breaches

-
Regulations
Training has become more of a priority for companies and can sometimes be required under regulations/guidance (PCI/CMMC/HITRUST/Cyber Insurance/State Regulations), to name a few!
-
600%
The COVID-19 pandemic increased the rate of cybercrime by 600%. While companies struggled to adapt, their guard was let down long enough for cybercriminals to take advantage.
-
93%
Cybercriminals can penetrate 93% of company networks, infiltrating an organization’s network perimeter and gaining access to local resources among many organizations, companies, and sectors.
Available Courses & Training
-
Application Security
OWASP Top 10 Proactive Controls
XSS: What is the big deal anyway
DevOps / DevSecOps ‐ Security in the SDLC
Threat Modeling
Digital Identity Foundations
OAuth vs. OIDC: Confusion in Authentication
Creating Security Intelligent Applications
Understanding Cryptography
Information Disclosure
ClickJacking and CSRF
Spring Security
ReactJS Security
Secure REST Programming
OWASP API Security Top 10
Introduction to Application Security
Advanced Application Security
-
Leadership & Management Training
Developing a Robust Security Program
Managing Supply Chain Risk
Building a Culture of Security within an Organization
Developing a Personal Security Program
Leading a Cross-functional Security Team
-
Application Security Training
Introduction to Application Security
Introduction to OWASP Top 10 Controls
Platform Specific Security
User Interface Security
Software Security Development Life Cycle (SSDLC)
Application Security: Vetting the Security of Web and Mobile Applications
-
InfoSec & Risk Management Training
Information Security Management
Introductory Practitioners
Introductory InfoSec Management
Risk Management for Security Professionals
Risk Management for Business Leaders
Information Systems Auditing
Foundations of Third-Party Information Risk Management
Implementing an Effective Third-Party Risk Management Program
In-Depth Technical Auditing
-
End User Awareness Training
Security Awareness for Executives and The Board
Security Awareness for the Business
-
Network Security Training
Open Source Intelligence (OSINT) Gathering Workshop
Information Security for Systems Administrators
Hands on Penetration Testing Fundamentals
-
Cloud Security Training
Audit and Security for Cloud-Based Services
-
Cyber Seurity Domains Training
CISSP Exam Prep Training
-
Identity Access Management Training
Identity Access Management Fundamentals
-
Cloud Security
Intro to Cloud Security
Cloud Security for Experienced IT Staff
Application Security for the Cloud
-
CompTIA Courses
IT Fundamentals
Network+
Security+
CYSA+
Pentest+
Cloud+