Systems Security Certified Practitioner Training Course
This course delves into the technical skills required for implementing, monitoring, and managing IT infrastructure by utilizing information security policies and procedures. It also covers how to safeguard the confidentiality, integrity, and availability of data.
This course is available as onsite live training in Norway or online live training.Course Outline
- Access Controls
- Security Operations and Administration
- Implement and use the risk Identification, Monitoring and Analysis methodologies
- Understand how to manage the Incident Response and Recovery
- Understand the Cryptography
- Understand the network and Communications Security
- Know Systems and Application Security principals
Requirements
Experience with Information Technology fields
Basics of Network devices and infrastructure
Open Training Courses require 5+ participants.
Systems Security Certified Practitioner Training Course - Booking
Systems Security Certified Practitioner Training Course - Enquiry
Systems Security Certified Practitioner - Consultancy Enquiry
Testimonials (5)
Multiple examples for each module and great knowledge of the trainer.
Sebastian - BRD
Course - Secure Developer Java (Inc OWASP)
Module3 Applications Attacks and Exploits, XSS, SQL injection Module4 Servers Attacks and Exploits, DOS, BOF
Tshifhiwa - Vodacom
Course - How to Write Secure Code
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
The trainer's subject knowledge was excellent, and the way the sessions were set out so that the audience could follow along with the demonstrations really helped to cement that knowledge, compared to just sitting and listening.
Jack Allan - RSM UK Management Ltd.
Course - Secure Developer .NET (Inc OWASP)
Nothing it was perfect.
Zola Madolo - Vodacom
Course - Android Security
Upcoming Courses
Related Courses
Android Security
14 HoursAndroid is an open platform designed for mobile devices, including smartphones and tablets. It offers a wide array of security features to facilitate the development of secure software; however, it also lacks certain security aspects found in other handheld platforms. This course provides a thorough overview of these features and highlights the most critical shortcomings related to the underlying Linux system, file management, and the general environment, as well as the use of permissions and other components of Android software development.
Common security pitfalls and vulnerabilities are discussed for both native code and Java applications, along with recommendations and best practices to avoid and mitigate these issues. Many discussions are supported by real-life examples and case studies. Additionally, we provide a brief overview of how to use security testing tools to identify any programming bugs that could impact security.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding
- Learn about the security solutions available on Android
- Discover how to utilize various security features of the Android platform
- Gain insights into recent vulnerabilities in Java on Android
- Understand typical coding mistakes and how to avoid them
- Learn about native code vulnerabilities on Android
- Recognize the severe consequences of insecure buffer handling in native code
- Comprehend architectural protection techniques and their limitations
- Access sources and further readings on secure coding practices
Audience
Professionals
Network Security and Secure Communication
21 HoursImplementing a secure networked application can be challenging, even for developers who have previously used various cryptographic components such as encryption and digital signatures. To ensure participants understand the role and usage of these cryptographic primitives, the course begins by laying a solid foundation on the main requirements of secure communication—secure acknowledgment, integrity, confidentiality, remote identification, and anonymity. It also addresses typical problems that can compromise these requirements and presents real-world solutions.
Given that cryptography is a critical aspect of network security, the course delves into the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement. Rather than providing an in-depth mathematical background, these elements are discussed from a developer's perspective, with practical use-case examples and considerations related to the application of cryptographic techniques, such as public key infrastructures. Security protocols used in various secure communication contexts are introduced, with a detailed examination of widely-used protocol families like IPSEC and SSL/TLS.
The course also covers typical vulnerabilities associated with certain cryptographic algorithms and protocols, including BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE, and similar attacks. Each vulnerability is described in terms of practical considerations and potential consequences, avoiding deep mathematical details.
As XML technology plays a central role in data exchange for networked applications, the security aspects of XML are thoroughly explored. This includes the use of XML in web services and SOAP messages, along with protection measures such as XML signatures and XML encryption. The course also addresses weaknesses in these protection measures and XML-specific security issues like XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
- Gain an understanding of basic concepts of security, IT security, and secure coding
- Comprehend the requirements of secure communication
- Learn about network attacks and defenses at various OSI layers
- Acquire a practical understanding of cryptography
- Understand essential security protocols
- Grasp recent attacks against cryptosystems
- Receive information on recent related vulnerabilities
- Understand the security concepts of Web services
- Access sources and further readings on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursThis three-day course delves into the fundamentals of securing C/C++ code against malicious users who might exploit various vulnerabilities related to memory management and input handling. The course focuses on the principles of writing secure code.
Advanced Java Security
21 HoursEven experienced Java programmers may not fully grasp the various security services provided by Java, nor are they always aware of the different vulnerabilities that can affect web applications written in Java.
This course covers more than just introducing the security components of Standard Java Edition; it also delves into the security issues surrounding Java Enterprise Edition (JEE) and web services. Before diving into specific services, the course lays a foundation in cryptography and secure communication. Various exercises explore both declarative and programmatic security techniques in JEE, as well as transport-layer and end-to-end security for web services. Practical exercises are included to help participants get hands-on experience with the discussed APIs and tools.
The course also examines and explains the most common and severe programming flaws found in the Java language and platform, along with web-related vulnerabilities. It covers not only typical bugs made by Java programmers but also security issues specific to the language and problems arising from the runtime environment. All vulnerabilities and associated attacks are demonstrated through straightforward exercises, followed by recommended coding guidelines and mitigation techniques.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and how to prevent them
- Comprehend the security principles of web services
- Gain proficiency in using various security features of the Java development environment
- Acquire a practical understanding of cryptography
- Understand the security solutions provided by Java EE
- Learn about common coding mistakes and how to avoid them
- Receive information on recent vulnerabilities in the Java framework
- Gain practical knowledge in using security testing tools
- Access sources and further readings on secure coding practices
Audience
Developers
Standard Java Security
14 HoursDescription
The Java language and the Runtime Environment (JRE) were designed to avoid many of the most common security vulnerabilities found in languages such as C/C++. However, software developers and architects should not only know how to utilize the various security features of the Java environment for positive security but also be aware of the numerous vulnerabilities that remain relevant for Java development, known as negative security.
Before diving into security services, the course provides a brief overview of cryptography fundamentals, ensuring everyone has a common understanding of their purpose and operation. Participants will engage in several practical exercises to explore these components firsthand, allowing them to experiment with the discussed APIs.
The course also delves into the most frequent and severe programming flaws specific to the Java language and platform. This includes both typical bugs made by Java programmers and issues unique to the language and environment. Each vulnerability and relevant attack is demonstrated through clear exercises, followed by recommended coding guidelines and mitigation techniques.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and how to prevent them
- Gain practical knowledge on using various security features in the Java development environment
- Develop a practical understanding of cryptography
- Learn about common coding mistakes and how to avoid them
- Receive information on recent vulnerabilities within the Java framework
- Access sources and further readings on secure coding practices
Audience
Developers
.NET, C# and ASP.NET Security Development
14 HoursA variety of programming languages are available today for compiling code to the .NET and ASP.NET frameworks. The environment offers robust tools for security development, but developers need to understand how to apply architecture- and coding-level techniques to implement effective security features and minimize vulnerabilities or their exploitation.
The goal of this course is to teach developers through numerous hands-on exercises how to prevent untrusted code from executing privileged actions, protect resources with strong authentication and authorization, facilitate remote procedure calls, manage sessions, explore different implementations for specific functionalities, and much more.
The introduction to various vulnerabilities begins by highlighting some common programming issues that arise when using .NET. The discussion on ASP.NET vulnerabilities also covers a range of environment settings and their impacts. Additionally, the course delves into ASP.NET-specific vulnerabilities, addressing both general web application security challenges and special issues like attacking the ViewState or string termination attacks.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding
- Learn about Web vulnerabilities beyond the OWASP Top Ten and how to prevent them
- Discover how to utilize various security features in the .NET development environment
- Gain practical experience with security testing tools
- Identify typical coding mistakes and learn strategies to avoid them
- Receive information on recent vulnerabilities in .NET and ASP.NET
- Access sources and further readings on secure coding practices
Audience
Developers
The Secure Coding Landscape
14 HoursThis course provides an introduction to common security concepts, offering a broad overview of vulnerabilities that are prevalent across different programming languages and platforms. It explains how to manage the risks associated with software security throughout the various phases of the software development lifecycle. Without delving deeply into technical specifics, it highlights some of the most significant and pressing vulnerabilities in various software development technologies. Additionally, it addresses the challenges of security testing and introduces techniques and tools that can be used to identify any existing issues in your code.
Participants attending this course will
- Gain an understanding of basic security principles, IT security, and secure coding practices.
- Learn about web vulnerabilities affecting both the server and client sides.
- Recognize the serious consequences of insecure buffer handling.
- Stay informed about recent vulnerabilities in development environments and frameworks.
- Discover typical coding errors and how to avoid them.
- Understand various security testing approaches and methodologies.
Audience
Managers
Secure coding in PHP
21 HoursThis course equips PHP developers with the essential skills needed to fortify their applications against modern internet-based attacks. It delves into web vulnerabilities through practical PHP examples, extending beyond the OWASP Top Ten to cover a wide range of injection attacks, script injections, session handling attacks, insecure direct object references, file upload issues, and more. The course categorizes PHP-related vulnerabilities into standard types such as missing or improper input validation, incorrect error and exception handling, misuse of security features, and time- and state-related problems. Specific examples include open_basedir circumvention, denial-of-service through magic float, and hash table collision attacks. Participants will gain hands-on experience with the most important techniques and functions to mitigate these risks.
Special emphasis is placed on client-side security, addressing JavaScript, Ajax, and HTML5 vulnerabilities. The course introduces several PHP extensions for cryptography, such as hash, mcrypt, and OpenSSL, as well as input validation tools like Ctype, ext/filter, and HTML Purifier. Best practices for hardening PHP configurations (including setting php.ini), Apache, and the server in general are also covered. Additionally, an overview of various security testing tools and techniques is provided, including security scanners, penetration testing and exploit packs, sniffers, proxy servers, fuzzing tools, and static source code analyzers.
Both the introduction to vulnerabilities and configuration practices are supported by numerous hands-on exercises that demonstrate the consequences of successful attacks, illustrate how to apply mitigation techniques, and introduce the use of various extensions and tools.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and how to prevent them
- Gain knowledge on client-side vulnerabilities and secure coding practices
- Acquire a practical understanding of cryptography
- Become proficient in using various security features of PHP
- Learn about common coding mistakes and how to avoid them
- Stay informed about recent vulnerabilities in the PHP framework
- Gain practical experience with security testing tools
- Receive sources and further readings on secure coding practices
Audience
Developers
Microsoft SDL Core
14 HoursThe comprehensive SDL core training offers an in-depth look into the principles of secure software design, development, and testing using Microsoft's Secure Development Lifecycle (SDL). It begins with a foundational overview of the key components of SDL and then delves into design strategies aimed at identifying and rectifying vulnerabilities early in the development process.
During the development phase, the course examines common security-related programming errors in both managed and native code. Attack vectors for these vulnerabilities are introduced alongside the corresponding mitigation techniques, all illustrated through interactive hands-on exercises that provide an engaging hacking experience. The curriculum also covers various security testing methods and showcases the effectiveness of different testing tools. Participants will gain a practical understanding of how to use these tools by applying them to previously discussed vulnerable code in several exercises.
Participants attending this course will
Grasp fundamental concepts of cybersecurity, IT security, and secure coding practices
Become familiar with the crucial steps of Microsoft's Secure Development Lifecycle (SDL)
Acquire knowledge on secure design and development methodologies
Learn principles for secure implementation
Comprehend security testing approaches
- Receive resources and additional reading materials on secure coding practices
Audience
Developers, Managers
Security Testing
14 HoursAfter gaining an understanding of vulnerabilities and attack methods, participants will explore the general approach and methodology for security testing, along with techniques to uncover specific vulnerabilities. Security testing begins with gathering information about the system (ToC, i.e., Target of Evaluation), followed by a comprehensive threat modeling process that identifies and rates all potential threats, leading to a risk analysis-driven test plan.
Security evaluations can be conducted at various stages of the SDLC, including design review, code review, reconnaissance, information gathering about the system, testing the implementation, and securing the environment for deployment. The course delves into numerous security testing techniques in detail, such as taint analysis, heuristic-based code review, static code analysis, dynamic web vulnerability testing, and fuzzing. Various tools are introduced to automate the security evaluation of software products, with practical exercises where participants use these tools to analyze previously discussed vulnerable code. Real-life case studies enhance the understanding of various vulnerabilities.
This course equips testers and QA staff to effectively plan and execute precise security tests, select and utilize the most appropriate tools and techniques to uncover even hidden security flaws, providing essential practical skills that can be applied immediately in their work.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding
- Learn about Web vulnerabilities beyond the OWASP Top Ten and how to mitigate them
- Understand client-side vulnerabilities and best practices for secure coding
- Comprehend different approaches and methodologies in security testing
- Gain practical experience using security testing techniques and tools
- Access sources and further readings on secure coding practices
Audience
Developers, Testers
Secure Web Application Development and Testing
21 HoursProtecting web-accessible applications necessitates security professionals who are well-prepared and constantly aware of current attack methods and trends. A variety of technologies and environments exist that facilitate the comfortable development of web applications. It is essential not only to be aware of the security issues specific to these platforms but also to understand general vulnerabilities that apply regardless of the development tools used.
This course provides an overview of applicable security solutions in web applications, with a particular emphasis on understanding the most important cryptographic solutions to implement. Various web application vulnerabilities are discussed, both on the server side (in line with the OWASP Top Ten) and the client side. These vulnerabilities are demonstrated through relevant attacks, followed by recommended coding techniques and mitigation methods to prevent associated problems. The discussion on secure coding concludes by addressing common security-related programming mistakes in areas such as input validation, improper use of security features, and code quality.
Testing is crucial for ensuring the security and robustness of web applications. Different approaches—from high-level auditing to penetration testing and ethical hacking—can be employed to identify various types of vulnerabilities. However, to move beyond easily identifiable issues, security testing must be well-planned and executed effectively. It is important to remember that while security testers should ideally find all bugs to protect a system, adversaries only need to discover one exploitable vulnerability to gain access.
Practical exercises will enhance understanding of web application vulnerabilities, programming mistakes, and most importantly, the mitigation techniques. Hands-on trials with various testing tools—from security scanners, through sniffers, proxy servers, fuzzing tools to static source code analyzers—will equip participants with essential practical skills that can be applied immediately at work.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and how to avoid them
- Learn about client-side vulnerabilities and secure coding practices
- Gain a practical understanding of cryptography
- Understand different approaches and methodologies in security testing
- Acquire practical knowledge in using security testing techniques and tools
- Stay informed about recent vulnerabilities in various platforms, frameworks, and libraries
- Access sources and further readings on secure coding practices
Audience
Developers, Testers
DevOps Security: Creating a DevOps Security Strategy
7 HoursIn this instructor-led, live course in Norway, participants will learn how to formulate the proper security strategy to face the DevOps security challenge.
How to Write Secure Code
35 HoursThis Course in Norway aims to help in the following:
- Help Developers to master the techniques of writing Secure Code
- Help Software Testers to test the security of the application before publishing to the production environment
- Help Software Architects to understand the risks surrounding the applications
- Help Team Leaders to set the security base lines for the developers
- Help Web Masters to configure the Servers to avoid miss-configurations
Secure Developer Java (Inc OWASP)
21 HoursThis course delves into secure coding concepts and principles using Java, following the Open Web Application Security Project (OWASP) methodology for testing. OWASP is a global online community dedicated to creating freely available articles, methodologies, documentation, tools, and technologies focused on web application security.
Secure Developer .NET (Inc OWASP)
21 HoursThis course delves into secure coding concepts and principles using ASP.net, following the Open Web Application Security Project (OWASP) methodology for testing. OWASP is an online community that develops freely available articles, methodologies, documentation, tools, and technologies in the realm of web application security.
The course examines the security features of the .NET Framework and how to secure web applications effectively.