Desktop Application Security in Java (DASEC-J)

Deze cursus is helaas verwijderd door Fast Lane. Bekijk hieronder de ervaringen van deelnemers, de alternatieven, of klik via de navigatie terug naar het overzicht van het hele aanbod in dit onderwerp.

check_box_outline_blank

Developing Secure Software

Logo van IT-Learning
|META_INFO|

Software developers know how essential secure coding practices are. Luckily, with today's tools, secure code doesn't take a lot of time or …

check_box_outline_blank

Designing and Implementing Effective Cybersecurity Controls

Logo van IT-Learning
|META_INFO|

In this course, learn the fundamentals of how security controls are designed and the relationship between vulnerability, threat, risk, and …

check_box_outline_blank

Learning Threat Intelligence

Logo van IT-Learning
|META_INFO|

Threat intelligence is a foundation of cybersecurity—because knowing what you’re defending against helps you focus on the most importan…

check_box_outline_blank

Cyber Emergency Management (CEM) Lead Implementer

Logo van ISO in the Sun
|META_INFO|

This five-day course provides an overview to the structure of a Cyber Emergency Management System (CEM) based on ISO/IEC 27001 and associat…

check_box_outline_blank

Threat Modeling: Tampering in Depth

Logo van IT-Learning
|META_INFO|

Threat modeling allows security pros and software developers to proactively address the inevitable—hackers trying to compromise a systemâ…

check_box_outline_blank

Threat Modeling: Spoofing In Depth

Logo van IT-Learning
|META_INFO|

Threat modeling is a framework for thinking about what goes wrong. Security pros and software developers should learn to threat model early…

check_box_outline_blank

A Standalone Project: Create a Threat Intelligence Analysis by Infosec

Logo van IT-Learning
|META_INFO|

Apply your threat intelligence knowledge with this hands-on project designed to map an organization against the cyber threat landscape. Com…

check_box_outline_blank

Advanced Cyber Threat Intelligence

Logo van IT-Learning
|META_INFO|

Do you want to take your cyber threat intelligence skills to the next level so you can better protect your organization? In this advanced c…

check_box_outline_blank

Leveraging AI for Threat Intelligence

Logo van IT-Learning
|META_INFO|

Interested in leveraging AI for cyber defense, but not sure where to begin? This course helps you unlock the transformative power of AI to …

check_box_outline_blank

Advanced Threat Modeling and Risk Assessment in DevSecOps

Logo van IT-Learning
|META_INFO|

This course provides a structured approach to understanding threat modeling principles, risk assessment methodologies, and their applicatio…