DATE : On-demand COURSE DESCRIPTION The objective of this training is to introduce to the students the news-federated services around application authentication. Indeed, application authentication evolves around federated services, whether they are enterprise-specific or cloud-based. These services involve rethinking the traditional vision of client / server authentication to adapt to new models. Federation simplifies IAM [...]
DATE : On-demand COURSE DESCRIPTION The student will have a two-and-a-half-hour session, which should enable him to understand the required skills, decision impacts and needs in order to react efficiently before and during a security incident. The following knowledge will be share: Case A – Breach for money In this scenario, an attacker breached the [...]
DATE : On-demand COURSE DESCRIPTION The objective of this training is to introduce the students to the defensive side of the Application Security. What the students will learn: During this training, the students will discover: • What is the Application Security? • Why the security of an application is important for is life in the [...]
DATE : On-demand COURSE DESCRIPTION The objective of this training is to allow the students to discover the offensive side of the Application Security about Mobile Application and practice it during a lab. What the students will learn: During this training, the students will discover: • What is a Mobile Application Vulnerability Assessment? • The [...]
DATE : On-demand COURSE DESCRIPTION The objective of this training is to allow the students to discover the offensive side of the Application Security about Web Application and practice it during a lab. What the students will learn: During this training, the students will discover: • What is a Web Application Vulnerability Assessment? • The [...]
DATE : On-demand COURSE DESCRIPTION The objective of this training is to present to the students different kinds of application vulnerabilities. What the students will learn: During this training, the students will discover: • Different kind of vulnerabilities that are commonly present in applications; • How to detect them; • How to validate them; • [...]
DATE : On-demand. COURSE DESCRIPTION 1st day: Introduction to the Web Application Vulnerability Assessment & Introduction to the Mobile Application Vulnerability Assessment Training identity card: Type: Labs; Audience: Everyone that have already developed web applications; Technology: Web technologies. Objective: The objective of this training is to allow the students to discover the offensive [...]
DATE : On-demand COURSE DESCRIPTION The student will have one training day, which should enable him to understand the required skills, decision impacts and needs in order to react efficiently before and during a security incident. Approach & Methodology The following knowledge will be share: Introduction to Att&Ck Pre_Att&Ck, Enterprise, Mobile and ICS version Att&Ck 12 [...]