Desktop Application Security in Python (DASEC-PY)

Deze cursus is helaas verwijderd door Fast Lane. Bekijk hieronder de ervaringen van deelnemers, de alternatieven, of klik via de navigatie terug naar het overzicht van het hele aanbod in dit onderwerp.

check_box_outline_blank

Developing Secure Software

Logo van IT-Learning
|META_INFO|

Software developers know how essential secure coding practices are. Luckily, with today's tools, secure code doesn't take a lot of time or …

check_box_outline_blank

Designing and Implementing Effective Cybersecurity Controls

Logo van IT-Learning
|META_INFO|

In this course, learn the fundamentals of how security controls are designed and the relationship between vulnerability, threat, risk, and …

check_box_outline_blank

AI Product Development: Secure by Design

Logo van IT-Learning
|META_INFO|

Discover a holistic approach to building AI systems that are secure by design, covering security controls at every layer of the AI lifecycl…

check_box_outline_blank

Learning Threat Intelligence

Logo van IT-Learning
|META_INFO|

Threat intelligence is a foundation of cybersecurity—because knowing what you’re defending against helps you focus on the most importan…

check_box_outline_blank

Threat Modeling: Tampering in Depth

Logo van IT-Learning
|META_INFO|

Threat modeling allows security pros and software developers to proactively address the inevitable—hackers trying to compromise a systemâ…

check_box_outline_blank

Threat Modeling: Spoofing In Depth

Logo van IT-Learning
|META_INFO|

Threat modeling is a framework for thinking about what goes wrong. Security pros and software developers should learn to threat model early…

check_box_outline_blank

Cyber Emergency Management (CEM) Lead Implementer

Logo van ISO in the Sun
|META_INFO|

This five-day course provides an overview to the structure of a Cyber Emergency Management System (CEM) based on ISO/IEC 27001 and associat…

check_box_outline_blank

A Standalone Project: Create a Threat Intelligence Analysis by Infosec

Logo van IT-Learning
|META_INFO|

Apply your threat intelligence knowledge with this hands-on project designed to map an organization against the cyber threat landscape. Com…

check_box_outline_blank

AngularJS 1: Form Validation

Logo van IT-Learning
|META_INFO|

Validation is key to successful online forms. Implementing dynamic form validation that reacts to input can be difficult to implement with …

check_box_outline_blank

Advanced Cyber Threat Intelligence

Logo van IT-Learning
|META_INFO|

Do you want to take your cyber threat intelligence skills to the next level so you can better protect your organization? In this advanced c…