boxed
image
#d9d9d9
http://securisksolutions.com/wp-content/themes/smartbox-installable/
http://securisksolutions.com/
#26ade4
style4

Training Solutions

About our Training Solutions:

From our extensive background and experience in training, we recommend that tailoring existing and co-developing training and education (T&E) materials to fit your company needs, gives you the maximum return on investment. One of the prime solutions that SecuRisk Solutions provides its customers is customized training.

We would work closely with you and co-develop the training that best suits your needs. This ensures that the people from your company who are train can relate and apply the knowledge and skills gained, almost immediately, on their jobs.

Training Courses:


Application Security for Executives & Managers

Course Description

 

Executives and managers are given a high level overview of the current threat landscape of the dangers against their company’s applications and an introduction into what controls their teams need to take into account and implement as part of their applications development lifecycle, in this course. Eye opening demonstrations on how software is compromised by hackers and what one can do to protect against such hacker threats is an integral part of this course.

 

Course Details

 

Duration: 4 hours (can be adjusted as needed)
Target Audience: Executive Management (CXOs, President, VP, Board), Senior Management, Development Managers, General Managers.


Building Hacker Resilient Applications

Course Description

 

Build it in and not bolt it on is the mantra when it comes to building secure applications and systems. In this course, you will learn about secure application development – from its requirements analysis phases to its retirement (end-of-life). You will learn about what happens under the covers of an attack (hack) and what you need to design, develop and deploy in order to fix vulnerabilities. At the end of this course, you will be equipped with the knowledge to build hacker resilient secure applications.

 

Course Details

 

Duration: 3 days
Target Audience: Functional level Managers, Architects, Developers, Testers, Operational personnel, Project managers, Program managers, Anyone involved in the application development life cycle.


Writing Secure Code (Developers)

Course Description

 

While some application security hacks are due to design flaws, most application security hacks are made possible because of insecure code. It is therefore extremely important to write secure code. In this course you will not only learn what insecure code looks like, but also learn to write secure code and review code for insecurities. You will learn about techniques like input validation, output encoding, parameterization, tokenization, error handling, compiler switches and more.

 

Course Details

 

Duration: 1 day
Target Audience: Developers, Programmers, Architects


Security for Quality Assurance (Testers)


Course Description

 

Quality code does not necessarily mean secure code. Verification and validation (V&V) processes are necessary to ensure that the security controls built in are not only present by also effective in mitigation hacker attempts. Systems and applications that have passed all quality assurance tests have still be found exploitable. In this course, you will learn about testing systems and applications for security vulnerabilities using static code analysis, dynamic testing, whitebox, blackbox, greybox and penetration testing techniques.

 

Course Details

 

Duration: 1 day
Target Audience: Testers, Quality Assurance Teams, Security Testers


End User Security Awareness


Course Description

 

User awareness training is the first step in not just protection your company and systems but also oneself. In this course, you will learn about how not to fall prey to the greatest weakness i.e., human trust. Even the most security professionals are susceptible to social engineering threats. Starting with some of the basics of cybersecurity such as password security, email security etc., this course will go into some sophisticated spoofing techniques. The course is filled with practical examples and exercises to change user behavior from being susceptible to secure. In addition to anecdotal examples, techniques leveraging technology to trick users would be demonstrated.

 

Course Details

 

Duration: 4 hours 
Target Audience: Anyone

 


Application Security for Executives & Managers

Course Description

 

Executives and managers are given a high level overview of the current threat landscape of the dangers against their company’s applications and an introduction into what controls their teams need to take into account and implement as part of their applications development lifecycle, in this course. Eye opening demonstrations on how software is compromised by hackers and what one can do to protect against such hacker threats is an integral part of this course.

 

Course Details

 

Duration: 4 hours (can be adjusted as needed)
Target Audience: Executive Management (CXOs, President, VP, Board), Senior Management, Development Managers, General Managers.

Building Hacker Resilient Applications

Course Description

 

Build it in and not bolt it on is the mantra when it comes to building secure applications and systems. In this course, you will learn about secure application development – from its requirements analysis phases to its retirement (end-of-life). You will learn about what happens under the covers of an attack (hack) and what you need to design, develop and deploy in order to fix vulnerabilities. At the end of this course, you will be equipped with the knowledge to build hacker resilient secure applications.

 

Course Details

 

Duration: 3 days
Target Audience: Functional level Managers, Architects, Developers, Testers, Operational personnel, Project managers, Program managers, Anyone involved in the application development life cycle.

Writing Secure Code (Developers)

Course Description

 

While some application security hacks are due to design flaws, most application security hacks are made possible because of insecure code. It is therefore extremely important to write secure code. In this course you will not only learn what insecure code looks like, but also learn to write secure code and review code for insecurities. You will learn about techniques like input validation, output encoding, parameterization, tokenization, error handling, compiler switches and more.

 

Course Details

 

Duration: 1 day
Target Audience: Developers, Programmers, Architects

Security for Quality Assurance (Testers)


Course Description

 

Quality code does not necessarily mean secure code. Verification and validation (V&V) processes are necessary to ensure that the security controls built in are not only present by also effective in mitigation hacker attempts. Systems and applications that have passed all quality assurance tests have still be found exploitable. In this course, you will learn about testing systems and applications for security vulnerabilities using static code analysis, dynamic testing, whitebox, blackbox, greybox and penetration testing techniques.

 

Course Details

 

Duration: 1 day
Target Audience: Testers, Quality Assurance Teams, Security Testers

End User Security Awareness


Course Description

 

User awareness training is the first step in not just protection your company and systems but also oneself. In this course, you will learn about how not to fall prey to the greatest weakness i.e., human trust. Even the most security professionals are susceptible to social engineering threats. Starting with some of the basics of cybersecurity such as password security, email security etc., this course will go into some sophisticated spoofing techniques. The course is filled with practical examples and exercises to change user behavior from being susceptible to secure. In addition to anecdotal examples, techniques leveraging technology to trick users would be demonstrated.

 

Course Details

 

Duration: 4 hours 
Target Audience: Anyone

 

Format & Delivery

The training content can be delivered both onsite (instructor led) and remotely through online computer based tutorials (CBTs) and/or a mentoring program.

All of our training is hands-on and replete with scenarios and case studies from real world situations. The instructors are certified and top-notch with very good inter-personal and pedagogical skills.

Hey! I am first heading line feel free to change me

paged
Loading posts...
link_magnifier
#6E787E
off
fadeInUp
loading
#6E787E
off