Security Training

Cybercriminals are constantly evolving, leaving organizational systems and applications vulnerable due to outdated coding practices. Developers must proactively integrate secure coding best practices into their workflows to identify and eliminate vulnerabilities before deployment. Equip your developers with secure coding training and build robust defenses for your organization's sensitive data and reputation.

AI Security, Compliance, and Explainability
Course ID: WA3410
Delivery: On-Site or Instructor-led Virtual

In this AI course, attendees master the AI auditing processes and understand the importance of making AI transparent through explainability techniques. Students also learn AI's role in various sectors, best practices for system security, and the intricacies of AI design and deployment.

Security Fundamentals for Software Engineers
Course ID: WA3358
Delivery: On-Site or Instructor-led Virtual

This Security fundamentals course covers basic security concepts and more advanced topics, such as threat modeling and risk management. By the end of this course, students are able to understand the principles of information security, apply security concepts to real-world situations, implement security controls to protect information assets, evaluate the security of information systems, and manage information security risks.

Machine Learning Security
Course ID: AC3348
Delivery: On-Site or Instructor-led Virtual

Protect your Machine Learning (ML) applications. This ML Security training course teaches developers the specialized secure coding skills needed to protect their ML applications from attacks. Attendees learn how to identify and address potential security vulnerabilities in their applications and how to avoid the security pitfalls of the Python programming language.

Python Security: Introduction to Python Programming for Security Analysts & Professionals
Course ID: TP3379
Delivery: On-Site or Instructor-led Virtual

This Python course teaches attendees how to preform security-related tasks such as log manipulation and forensics. Students learn how to implement security reviews and audits of Python applications and support development teams to implement better defenses in Python. Extra emphasis is placed on features unique to Python, such as tuples, array slices, and output formatting. 
CISSP Certification Prep
Course ID: TP3420
Delivery: On-Site or Instructor-led Virtual

This CISSP Certification Prep training gives attendees a comprehensive review of information security concepts and industry best practices, focusing on the eight domains of the CISSP-CBK (Common Body of Knowledge) that are covered in the CISSP exam.

CISSP Training and Certification Exam Preparation
Course ID: TP3421
Delivery: On-Site or Instructor-led Virtual

This official (ISC)2® CISSP certification course prepares attendees to pass the exam and become a CISSP. Attendees learn the foundational knowledge to fully prepare for the exam.

AWS Security Best Practices
Delivery: On-Site or Instructor-led Virtual

Currently, the average cost of a security breach can be upwards of $4 million. AWS Security Best Practices provides an overview of some of the industry best practices for using AWS security and control types. This course helps you understand your responsibilities while providing valuable guidelines for how to keep your workload safe and secure. You will learn how to secure your network infrastructure using sound design options. You will also learn how you can harden your compute resources and manage them securely. Finally, by understanding AWS monitoring and alerting, you can detect and alert on suspicious events to help you quickly begin the response process in the event of a potential compromise.
Security Engineering on AWS
Delivery: On-Site or Instructor-led Virtual

Security is a concern for both customers in the cloud, and those considering cloud adoption. An increase in cyberattacks and data leaks remains top of mind for most industry personnel. The Security Engineering on AWS course addresses these concerns by helping you better understand how to interact and build with Amazon Web Services (AWS) in a secure way. In this course, you will learn about managing identities and roles, managing and provisioning accounts, and monitoring API activity for anomalies. You will also learn about how to protect data stored on AWS. The course explores how you can generate, collect, and monitor logs to help identify security incidents. Finally, you will review detecting and investigating security incidents with AWS services.
AWS Security Essentials
Delivery: On-Site or Instructor-led Virtual

This course covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are responsible for implementing security in the AWS Cloud and what security-oriented services are available to you and why and how the security services can help meet the security needs of your organization.
AWS Security Governance at Scale
Delivery: On-Site or Instructor-led Virtual

In this course, you will learn how to facilitate developer speed and agility, and incorporate preventive and detective controls. By the end of this course, you will be able to apply governance best practices.

Security in Google Cloud
Course ID: GCP-SEC-3
Delivery: On-Site or Instructor-led Virtual

This training course gives you a broad study of security controls and techniques in Google Cloud. Through lectures, demonstrations, and labs, you explore and deploy the components of a secure Google Cloud solution. You use services including Cloud Identity, Identity and Access Management (IAM), Cloud Load Balancing, Cloud IDS, Web Security Scanner, BeyondCorp Enterprise, and Cloud DNS.
GCP Networking and Security
Course ID: WA3213
Delivery: On-Site or Instructor-led Virtual

This Google Cloud training course teaches attendees how to secure a Google Cloud Platform (GCP) environment.  This course explores core concepts like resource hierarchy, VPC networking, and Compute Engine security. This class then tackles advanced topics like Cloud NAT, Private Google Access, and Cloud Interconnect, all designed to safeguard valuable data and applications on GCP.