Secure Coding
For security to be fully integrated within the SDLC, organizations must hire, retain and continuously train their staff in secure coding practices, shifting security left within the cycle and ensuring systems are secure from the get-go. Through our strategic partnership with Cycubix LTD we deliver agnostic as well as language specific secure coding training to avoid common and complex programming bugs which result in exploitable code. Based on OWASP, CWE and other tools and methodologies, our training empowers devops and security teams to reach a resilient "secure by design" state in software products.

Web Application Security Essentials
Web applications play a key role in the success of an organisation – from streamlining business processes to creating online interactions that ensure a positive customer experience. However, web applications do allow access to critical and confidential resources. But without understanding web application vulnerabilities and addressing them, organisations risk their data, their operations and their reputation.
Learn more Buy Course
Secure Coding in Java
Java is used to develop full featured and very powerful corporate applications. Many of these applications do allow access to critical and confidential resources and this has made them popular targets for attack. To minimise the likelihood of security vulnerabilities caused by programmer error, Java developers must understand and adhere to best practices.
Learn more
Secure Coding in .NET
The .NET framework provides unprecedented flexibility and productivity to web application developers. Many applications allow access to critical and confidential resources and this has made them popular targets for attack. Application developers are responsible for understanding the limitations of the .NET framework and adopting best practices to ensure that their code is secure.
Learn moreDigital Forensics and Incident Response
Successfully thwarting an attack is not limited to preventing a breach, as it is likely that sooner or later every organization is targeted and compromised to a certain degree, whether by a simple malware attack or a high profile data theft incident. It is therefore crucial to set up and maintain an effective DFIR capability that is able to timely detect, analyze, contain, erradicate, recover and learn from incidents, while acquiring and preserving critical digital evidence.

Practical Forensics: An Essential Guide to Incident Response
This course provides the knowledge and resources required to triage, analyze and effectively respond to computer security incidents. The participants, through the understanding of theory and a strong focus on practical exercises, will be able to acquire best-of-breed tools and techniques aimed at quickly identifying and thwarting attacks, uncovering and preserving vital evidence, while allowing for complete and accurate recovery of the affected assets.
Learn more Buy Course