Loading...

Check out security training modules and combine them for your requirements

For Developers
Secure Coding Module

Starting from best practices and common use cases, this module covers a wide variety of topics regarding secure coding and product development.

RECOMMENDED
  • check_circleMultiple programming languages
  • check_circleVulnerabilities explained in detail
  • check_circleRemediation types and effects
  • check_circleCI/CD Security & Shift-Left
  • check_circleSecure Development Lifecycle
  • check_circleCase studies and solutions
  • check_circleContent for backend and frontend
  • check_circleConsultancy from our security team
For Operations
Infrastructure Module

Infrastructure security best practices, pitfalls, infrastucture automation and cloud architecture security are all included within this module.

RECOMMENDED
  • check_circleCommon threats for infrastructure
  • check_circleProtection mechanisms for threats
  • check_circleEffective infrastructure defenses
  • check_circleIncident response basics & forensics
  • check_circleForensics with non-repudiation
  • check_circleCloud security modules
  • check_circleConsultancy from our security team
For Managers & Leaders
Security Leadership Module

For effective management of security teams, this module is recommended for leaders and managers. Topics such as importance of keeping team members balanced between boredom and stress are covered in this module.

RECOMMENDED
  • check_circleTeam building & structuring
  • check_circleEffective management for security
  • check_circleBug bounty programs
  • check_circleInter-team communication
  • check_circleCreating a security product portfolio
  • check_circleManaging security breaches
  • check_circleCertification & compliance
  • check_circleTeam utilization against quiet quitting
For IT Admins
Administration Module

Organizational administration and control is one of the most crucial fields for a company to operate properly. Safeguarding company assets with necessary access controls is a prime topic for this module.

  • check_circleDevice inventory control
  • check_circleRemote working and personal use
  • check_circleProvisioning for computers and phones
  • check_circleMobile device management
  • check_circleIdentity providers, SSO and 2FA
  • check_circleProper onboarding and offboarding
For People Operations
Hiring Module

Building a team of engineers is no easy task, especially if being done from ground up. Choosing / eliminating candidates alongside keeping the team functional and happy can only be achieved via good people operation principles.

  • check_circleSchema of a good hiring process
  • check_circleDo's and don'ts for peope operations
  • check_circleNecessary requirements for security roles
  • check_circleOrganization size and corresponding team roles
  • check_circleDealing with toxicity
  • check_circleThe concept of team-fit
For Designers & UX/UI
Security-Friendly Design Module

One of the least-thought areas of development, designing and planning a UX with security in mind is also a part of this training program. Convincing users to take security into consideration without scaring them away boosts security standing greatly.

  • check_circleSecurity friendly design principles
  • check_circleIndications of danger and safety
  • check_circleComponents, colors and sounds
  • check_circleEncouraging user feedback
  • check_circleCorrect wording for user actions

Have other questions?

Feel free to reach our support team.