Starts on 19 May 2020, Microsoft Teams
Cybersecurity Awareness
Online Training
COVID-19 Early Bird Price: 725RON+TVA until May 4th 2020
COVID-19 Full Price: 1225RON +TVA
Original Training Price: 1500RON
Learn from our Certified Ethical Hacker how you can protect and secure your work to outsmart a black hat hacker.
What you'll learn
Designed for developers, testers, project managers, database admins, system and network administrators, it covers areas that help IT professionals understand more detailed aspects of the weaknesses, attacks, and defenses used to attack or protect critical infrastructure and applications, both on-premise and in the cloud.
Cybersecurity Awareness Online Training is essential for all IT professionals. Get the knowledge you need to secure and protect your work in just 6 days! The training will take only 3 hours a day on two consecutive weeks: May 19th-21th and May 26th-28th 2020.
Course Outline
The current cybersecurity landscape
Industry trends & keeping up-to-date
IT Security overview
Foundations of Security, Assume Breach, Wireless Network Security, Social Engineering
Thinking like a Hacker
Footprinting, Reconnaissance, Scanning Networks, Enumeration, Sniffing, System Hacking, Cryptography, Denial of Service
Attacking Web Servers & Applications
Footprinting the Web Infrastructure, Defense in Depth, Attacking Web Servers, Analyzing Web Applications, Authentication Mechanisms, Authorization Schemes, Session Management, Injection Attacks, Man-in-the-Middle Attacks, Data Connectivity, Web App Clients, Web Services
OWASP Web Top 10
Injection, Broken Authentication, Sensitive Data Exposure, XML External Entities (XXE), Broken Access Control, Security misconfigurations, Cross-Site Scripting (XSS), Insecure Deserialization, Using Components with Known Vulnerabilities, Insufficient Logging & Monitoring
Security through SDLC
Developing Secure Code, Security Reviews, OWASP Testing & Code Review Guides, Least Privilege, Fail-Close vs. Fail-Open, Threat Modeling, Microsoft SDL, OWASP ASVS, Learning Resources (links, books, vulnerable apps)
Tudor Damian
CIO, Trainer
As an IT consultant with more than 15 years of experience in managing complex IT infrastructures, Tudor is a Certified Ethical Hacker, a Microsoft Cloud and Datacenter Management MVP and a technical speaker at local and regional community events.
What you’ll get
Access to the training
This course is full of real-life examples, findings from studies and practical approaches you’ll need to know to protect your code, app or business.
Full slides and additional resources
After the workshop you’ll get access to all the slides presented.
Ask the expert
During and after the seminar you’ll be able to ask questions from our security expert with over 10 years of experience in the field of security.
One of our most requested training through the years
Testimonials
“
Well organized materials, a perfect introduction to security.
Gabriel Musteata
PHP TeamLeader
“
In my position working on pre-sales and projects specifications I came across clients and security requests every day and the general knowledge from here will be very helpful.
Dan Tudorache
Technical Consultant
“
I think this is a course that should be consider by all developers and IT specialists.
Iulia Chitan
Ruby developer
Meet the Trainer
Tudor Damian
CIO & Partner @ Avaelgo,
Trainer, Certified Ethical Hacker,
Microsoft CDM MVP
As an IT consultant with more than 15 years of experience in managing complex IT infrastructures, Tudor is a Certified Ethical Hacker, a Microsoft Cloud and Datacenter Management MVP and a technical speaker at local and regional community events.
He often talks about the latest technologies and trends with themes including cloud and hybrid networking & security, virtualization technologies, social engineering and information security awareness, web application security, white-hat hacking and penetration testing techniques.
Cybersecurity Awareness Training
Learn how to protect and secure your work and business
This workshop is an absolute must if you want to understand how containers work, how to deploy them and how to manage them. Register to gain an in-depth view of the newest container technologies in Azure.