Securing Information Technology

20,0080,00

Anyone with any responsibility for data management or data systems needs to understand the basics of how to set about preserving the security of the data for which they are responsible and the systems that store and process it. This course assist those involved in software development to understand best practices and what is required of them. The course explains clearly and simply, how hackers exploit software vulnerabilities in order to “steal” your data. The course goes on to explain the implications of securing your data on cloud services, making sure that your codes is secure and avoiding the key coding errors that make software insecure.

Clear
Tier deal
Quantity Discount Discounted price
1 - 50 % 20,00
51 - 250 50% 10,00
251 - 500 75% 5,00
501 - 1000 87.5% 2,50
Bulk pricing will be applied to package:

Description

Securing Information Technology Introduction:

  • Security and the Software Development Lifecycle (SDLC)
  • Best Practices
  • Course Test

Securing Information Technology Fundamentals:

  • Security and the Software Development Lifecycle (SDLC)
  • Best Practices
  • Course Test
  • Security and the Software Development Lifecycle (SDLC)
  • Best Practices
  • Course Test
  • Security vulnerabilities
  • OWASP Top 10
  • How hackers exploit software vulnerabilities
  • Cloud computing and security
  • Course Test

Securing Information Technology Intermediate:

  • Security and the Software Development Lifecycle (SDLC)
  • Best Practices
  • Course Test
  • Security and the Software Development Lifecycle (SDLC)
  • Best Practices
  • Course Test
  • Security vulnerabilities
  • OWASP Top 10
  • How hackers exploit software vulnerabilities
  • Cloud computing and security
  • Course Test
  • Security and the Software Development Lifecycle (SDLC)
  • Best Practices
  • Course Test
  • Security vulnerabilities
  • OWASP Top 10
  • How hackers exploit software vulnerabilities
  • Cloud computing and security
  • Course Test
  • Secure coding and PCI DSS
  • SANS top 25 dangerous software errors
  • Course Test

Additional information

Modules

Introduction, Fundamentals, Intermediate

Reviews

There are no reviews yet.

Be the first to review “Securing Information Technology”

Your email address will not be published. Required fields are marked *