• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

744 SQL courses

Secure Programming of Web Applications

4.9(27)

By Apex Learning

Give a compliment to your career and take it to the next level. This Secure Programming of Web Applications will provide you with the essential knowledge and skills required to shine in your professional career. Whether you want to develop skills for your next job or want to elevate skills for your next promotion, this Secure Programming of Web Applications will help you keep ahead of the pack. The Secure Programming of Web Applications incorporates basic to advanced level skills to shed some light on your way and boost your career. Hence, you can reinforce your professional skills and essential knowledge, reaching out to the level of expertise required for your position. Further, this Secure Programming of Web Applications will add extra value to your resume to stand out to potential employers. Throughout the programme, it stresses how to improve your competency as a person in your profession while at the same time it outlines essential career insights in this job sector. Consequently, you'll strengthen your knowledge and skills; on the other hand, see a clearer picture of your career growth in future. By the end of the Secure Programming of Web Applications, you can equip yourself with the essentials to keep you afloat into the competition. Along with this Secure Programming of Web Applications course, you will get 10 other premium courses. Also, you will get an original Hardcopy and PDF certificate for the title course and a student ID card absolutely free. What other courses are included with this Secure Programming of Web Applications? Course 1: HTML Web Development for Beginners Course 2: SQL Server for Beginners Course 3: Python Programming for Everybody Course 4: Django Rest Framework Level 4 Course 5: Advanced Diploma in User Experience UI/UX Design Course 6: Data Structures Complete Course Course 7: Computer Science: Graph Theory Algorithms Course 8: Agile Practitioner Level 2 Course 9: Time Management Course 10: Decision Making and Critical Thinking As one of the top course providers in the UK, we're committed to providing you with the best educational experience possible. Our industry experts have designed the Secure Programming of Web Applications to empower you to learn all at once with accuracy. You can take the course at your own pace - anytime, from anywhere. So, enrol now to advance your career! Benefits you'll get choosing Apex Learning for this Secure Programming of Web Applications: One payment, but lifetime access to 11 CPD courses Certificate, student ID for the title course included in a one-time fee Full tutor support available from Monday to Friday Free up your time - don't waste time and money travelling for classes Accessible, informative modules taught by expert instructors Learn at your ease - anytime, from anywhere Study the course from your computer, tablet or mobile device CPD accredited course - improve the chance of gaining professional skills How will I get my Certificate? After successfully completing the course you will be able to order your CPD Accredited Certificates (PDF + Hard Copy) as proof of your achievement. PDF Certificate: Free (Previously it was £10 * 11 = £110) Hard Copy Certificate: Free (For The Title Course) If you want to get hardcopy certificates for other courses, generally you have to pay £20 for each. But this Fall, Apex Learning is offering a Flat 50% discount on hard copy certificates, and you can get each for just £10! P.S. The delivery charge inside the U.K. is £3.99 and the international students have to pay £9.99. Curriculum: Course 1: Secure Programming of Web Applications Section 01: Introduction Section 02: Well-known Vulnerabilities and Secure Programming Section 03: Conclusion and Summary Course 2: HTML Web Development for Beginners Module 01: Setup and Overview Module 02: Basic Tags Module 03: Headings Module 04: Lists Module 05: Links Module 06: Images Module 07: Tables Module 08: Advanced Tables Module 09: Meta Tags Module 10: Description Lists Module 11: Presentation Module 12: Iframe Module 13: Video Module 14: Audio Module 15: Forms Module 16: CSS CPD 115 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this Secure Programming of Web Applications bundle. Persons with similar professions can also refresh or strengthen their skills by enrolling in this course. Students can take this course to gather professional knowledge besides their study or for the future. Requirements Our Secure Programming of Web Applications is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career path Having these various expertise will increase the value in your CV and open you up to multiple job sectors. Certificates Certificate of completion Digital certificate - Included

Secure Programming of Web Applications
Delivered Online On Demand
£53

Microsoft Azure Cloud Concepts

4.9(27)

By Apex Learning

Overview This comprehensive course on Microsoft Azure Cloud Concepts will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Microsoft Azure Cloud Concepts comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast-track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Microsoft Azure Cloud Concepts. It is available to all students, of all academic backgrounds. Requirements Our Microsoft Azure Cloud Concepts is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 1 sections • 29 lectures • 03:33:00 total length •Unit 01: What will you learn and Cloud Concepts: 00:18:00 •Unit 02: Core Azure architectural components: 00:18:00 •Unit 03: LAB Create a Windows and Linux VM Computer: 00:10:00 •Unit 04: LAB Container creation: 00:04:00 •Unit 05: Storage with Azure: 00:04:00 •Unit 06: LAB Create a storage account: 00:07:00 •Unit 07: Network concepts: 00:03:00 •Unit 08: Lab Network Peering: 00:16:00 •Unit 09: Lab scale set: 00:11:00 •Unit 10: Marketspace and Serverless: 00:07:00 •Unit 11: Event HUB and Logic APPS: 00:07:00 •Unit 12: DevOps Overview: 00:04:00 •Unit 13: Azure Databases Overview: 00:04:00 •Unit 14: Lab SQL: 00:08:00 •Unit 15: What are AI and machine learning: 00:10:00 •Unit 16: Powershell and CLI: 00:09:00 •Unit 17: Azure Advisor: 00:05:00 •Unit 18: Review Core Azure: 00:04:00 •Unit 19: Azure security compliance and trust: 00:03:00 •Unit 20: Lab DDOS and NSGs: 00:07:00 •Unit 21: Authentication and Authorisation: 00:07:00 •Unit 22: Azure security centre: 00:06:00 •Unit 23: LAB Azure key vault and AIP overview: 00:06:00 •Unit 24: Azure Advanced Threat Protection (Azure ATP): 00:06:00 •Unit 25: Azure monitoring: 00:05:00 •Unit 26: Manage Azure Governance: 00:07:00 •Unit 27: Azure privacy and compliance: 00:04:00 •Unit 28: Summary: 00:03:00 •Unit 29: Azure Pricing and support: 00:10:00

Microsoft Azure Cloud Concepts
Delivered Online On Demand3 hours 33 minutes
£12

Getting Started with Spring Boot 2

By Packt

Learn how to build real-world applications using Spring Framework 5 and Spring Boot 2

Getting Started with Spring Boot 2
Delivered Online On Demand12 hours 56 minutes
£22.99

JavaFX Frontends Course, 2 Days

4.6(12)

By PCWorkshops

Java Front-ends for desktop and mobile With Java FX Programming Java Front-ends for desktop and mobile With Java FX In this course we create attractive, functional Front-ends using JavaFX. Prerequisites: Delegates already have basic Java Skills. Duration: 2 consecutive days, the first date shows as the booking date Where: Online with Gotomeeting.com Download: Download Java JDK and Eclipse IDE. London classroom: on request locations, bring you own device Location: Online Interactive Instructor-led Webinar. Our Style: This is a very practical course giving you hands-on practice. Included: Course exercises, notes, examples, computers, evaluations Certification: PCWorkshops JavaFX Qualification Java Intermediate and Front-end Course Description Database Concepts Revision: DataBase SQL, database principles and JDBC GUI's with Java FX Building Java FX GUI's Course Contents: GUI's with JavaFX Building Java GUI's. Create a front-end form interface for an application. Working with nodes, labels, inputboxes, prgress bars, etc. Formatting your front-end. Import a Java package to interact with the front-end. Interact with a database via the front-end. Practical Examine the Java SE event model. What is an event. What is event handling. Develop event handlers. Develop Lambda-style event handlers. Practical Create a quotation app. Create a movie booking app. How to create your installer and upload your app Webservices Java Web services What are Web Services? Why Java Web Services? Web Services - Characteristics Web Services - Architecture Web Services - Examples and exercises What is included PCWorkshops Course Certificate on completion Java Course Notes Java Code Examples Practical Java Course exercises, Java Course Revision work After the course: 1-Hour personalised online revision session Book the Java Intermediate and Front-end Course Powered by Eventbrite About us Our experienced trainers are award winners. More about us FAQ's Client Comments

JavaFX Frontends Course, 2 Days
Delivered In-PersonFlexible Dates
FREE

Accredited Microsoft Access 2007 Professional

By iStudy UK

Microsoft Access is the most powerful and well-known software for creating databases. This course is the advanced version of Microsoft Access 2007 beginner's level, as it will drive you to the advanced level of Microsoft Access 2007. Learn about the advanced features and functions of access 2007. Explore the advanced database tool and how can they be used. At the end of this course, you will be able to create databases as professionals. In this course you will learn the necessary skills, knowledge and information of Microsoft Access.  Course Highlights Accredited Microsoft Access 2007 Professional is an award winning and the best selling course that has been given the CPD Certification & IAO accreditation. It is the most suitable course anyone looking to work in this or relevant sector. It is considered one of the perfect courses in the UK that can help students/learners to get familiar with the topic and gain necessary skills to perform well in this field. We have packed Accredited Microsoft Access 2007 Professional into 13 modules for teaching you everything you need to become successful in this profession. To provide you ease of access, this course is designed for both part-time and full-time students. You can become accredited in just 11 hours hours and it is also possible to study at your own pace. We have experienced tutors who will help you throughout the comprehensive syllabus of this course and answer all your queries through email. For further clarification, you will be able to recognize your qualification by checking the validity from our dedicated website. Why You Should Choose Accredited Microsoft Access 2007 Professional Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? Accredited Microsoft Access 2007 Professional is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our Accredited Microsoft Access 2007 Professional is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. Module One - Getting Started 00:30:00 Module Two - Advanced Table Tasks 01:00:00 Module Three - Advanced Form Tasks 01:00:00 Module Four - Advanced Reporting Tasks 01:00:00 Module Five - Understanding Relationships 01:00:00 Module Six - Advanced Query Tasks 01:00:00 Module Seven - Working with SQL 01:00:00 Module Eight - Linking Data 01:00:00 Module Nine - Importing Data 01:00:00 Module Ten - Exporting Data 01:00:00 Module Eleven - Advanced Database Tools 01:00:00 Module Twelve - Wrapping Up 00:30:00 Activities Activities - Microsoft Access 2007 Advanced Level 00:00:00 Mock Exam Final Exam

Accredited Microsoft Access 2007 Professional
Delivered Online On Demand11 hours
£25

Spark Programming in Scala for Beginners with Apache Spark 3

By Packt

This course does not require any prior knowledge of Apache Spark or Hadoop. The author explains Spark architecture and fundamental concepts to help you come up to speed and grasp the content of this course. The course will help you understand Spark programming and apply that knowledge to build data engineering solutions.

Spark Programming in Scala for Beginners with Apache Spark 3
Delivered Online On Demand6 hours 47 minutes
£14.99

NSE 5 Bundle

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for networking and security professionals involved in the day-to-day management of a FortiAnalyzer appliance and FortiGate security information. Overview Describe key features and concepts of FortiAnalyzer Deploy an appropriate architecture Manage ADOMs on both FortiAnalyzer and the devices that log to it Configure RAID Register supported devices Encrypt log transmission (SSL / IPSec) View & analyze current and historical logs (FortiView) Monitor events Apply disk quotas to log data from devices Backup, restore, and forward log data Use content archiving (summary and full) Understand the different stages of data processing, from receiving logs to compiling reports Understand SQL queries and datasets used by FortiAnalyzer reports Design datasets, charts, and custom reports Generate reports by schedule or on demand In this 3-day NSE 5 Bundle, you will learn the fundamentals of using FortiManager and FortiAnalyzer for centralized network administration of many FortiGate devices. In this 3-day NSE 5 Bundle, you will learn the fundamentals of using FortiManager and FortiAnalyzer for centralized network administration of many FortiGate devices. Additional course details: Nexus Humans NSE 5 Bundle training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the NSE 5 Bundle course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

NSE 5 Bundle
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Peoplesoft PeopleTools I

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Administrators Developers Implementers Systems Administrators Overview Understand the PeopleSoft system architecture, application development methodology, and tool set so you can build and customize PeopleSoft applications efficiently to meet your organizations business requirements. Quickly and efficiently create functionality in PeopleSoft applications to take advantage of the unique capabilities of these applications. Gain Hands-On Experience Using PeopleSoft Application Designer Enrolling in this course will also give you hands-on experience with the Application Designer, the PeopleSoft integrated development environment (IDE). Learn to create and modify PeopleSoft definitions, including fields, records, pages and components. By the end of this course, you'll be able to use Application Designer to create and deploy PeopleSoft classic applications and fluid applications This PeopleTools I training introduces the PeopleSoft application development methodology. This 5-day course gives you a general overview of PeopleSoft system architecture, as well as the tool set used to develop new applications or customize existing PeopleSoft applications. Navigating PeopleSoft ApplicationsExplaining the PeopleSoft ArchitectureValidating DataUsing Application Designer to Develop ApplicationsDesigning the ApplicationCreating Record DefinitionsBuilding SQL TablesCreating Page DefinitionsRegistering ComponentsTesting ApplicationsEditing the Portal Registry StructureCreating Menu DefinitionsUnderstanding the Fluid User InterfaceCreating Fluid PagesUsing Delivered CSS Additional course details: Nexus Humans Oracle Peoplesoft PeopleTools I training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Peoplesoft PeopleTools I course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle Peoplesoft PeopleTools I
Delivered OnlineFlexible Dates
Price on Enquiry

Developer Training for Spark and Hadoop

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Hadoop Developers Overview Through instructor-led discussion and interactive, hands-on exercises, participants will navigate the Hadoop ecosystem, learning topics such as:How data is distributed, stored, and processed in a Hadoop clusterHow to use Sqoop and Flume to ingest dataHow to process distributed data with Apache SparkHow to model structured data as tables in Impala and HiveHow to choose the best data storage format for different data usage patternsBest practices for data storage This training course is the best preparation for the challenges faced by Hadoop developers. Participants will learn to identify which tool is the right one to use in a given situation, and will gain hands-on experience in developing using those tools. Course Outline Introduction Introduction to Hadoop and the Hadoop Ecosystem Hadoop Architecture and HDFS Importing Relational Data with Apache Sqoop Introduction to Impala and Hive Modeling and Managing Data with Impala and Hive Data Formats Data Partitioning Capturing Data with Apache Flume Spark Basics Working with RDDs in Spark Writing and Deploying Spark Applications Parallel Programming with Spark Spark Caching and Persistence Common Patterns in Spark Data Processing Spark SQL and DataFrames Conclusion Additional course details: Nexus Humans Developer Training for Spark and Hadoop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Developer Training for Spark and Hadoop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Developer Training for Spark and Hadoop
Delivered OnlineFlexible Dates
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry