2997 results
Sort by
INTERACTIVE
Creating Secure SQL Server and Azure SQL Database Applications
Security Innovation
40 mins
$99
Course OverviewIn this course, you will learn how to protect sensitive data and while ensuring the integrity of applications running on the Microsoft SQL Server Engine and Azure SQL Database.Duration40 minutes
INTERACTIVE
Creating Secure Oracle Database Applications
Security Innovation
45 mins
$99
Course OverviewThis course introduces database application developers to key industry best practices for data security, such as secure query construction and secure communication and storage. After completing this course, you will be able to describe how to write stored procedures securely. You will also be able to explain how to secure data stored in the database as well as data in transit using Oracle Database features.Duration45 minutes
INTERACTIVE
Essential Security Assessment and Authorization
Security Innovation
15 mins
$99
Course OverviewThis course provides essential guidance to individuals with information security implementation and operational responsibilities for developing and implementing personnel security policy and associated personnel security controls to help ensure compliance with applicable regulatory requirements.Duration15 minutes
INTERACTIVE
Securing Infrastructure Architecture
Security Innovation
30 mins
$99
Course OverviewThis course is designed for Network Operations Specialists and aligns with the NICE requirements for the secure planning, implementation and operation of network services and systems, including hardware and virtual environments. Coverage includes: Security Principles, Network Topologies, Demilitarized Zones, Routers, Switches, Bridges, Firewalls, Wireless Access Points, Transmission Media, Network Authentication Servers ConfigurationDuration30 minutes
INTERACTIVE
Essential Media Protection
Security Innovation
15 mins
$99
Course OverviewThis course provides essential guidance to individuals with information security implementation and operational responsibilities for developing and disseminating an organization-wide information media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, and coordination among organizational entities to facilitate compliance with applicable regulatory requirements.Duration15 minutes
COURSE
Creating Secure Code - SAP ABAP Foundations
Security Innovation
1 hr 30 mins
$99
Course OverviewThis course presents best practices and techniques for secure SAP application development using Java and ABAP. It discusses basic application security principles, input validation in SAP applications, common application security vulnerabilities and mitigations, protecting data using encryption, and conducting security code analysis and code reviews.Duration90 minutes
INTERACTIVE
Essential Data Protection
Security Innovation
15 mins
$99
Course OverviewThis course provides essential guidance to information system managers, information security managers, system designers and developers on implementing cryptographic controls at the information systems level to facilitate compliance with applicable regulatory requirements.Duration15 minutes
INTERACTIVE
Essential Security Maintenance Policies
Security Innovation
15 mins
$99
Course OverviewThis course provides essential guidance to individuals with information security implementation and operational responsibilities for developing procedures to facilitate the implementation of the system maintenance policy and associated system maintenance controls.Duration15 minutes
INTERACTIVE
Essential System and Information Integrity
Security Innovation
15 mins
$99
Course OverviewThis course provides essential guidance to program managers, system designers and developers on identifying systems affected by software flaws, including potential vulnerabilities resulting from those flaws, and report this information to designated organizational personnel.Duration15 minutes
INTERACTIVE
Essential Security Planning Policy and Procedures
Security Innovation
15 mins
$99
Course OverviewThis course provides essential guidance to individuals with information security implementation and operational responsibilities for developing and disseminating an organization-wide security planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.Duration15 minutes
Start your free Premium trialTry GO1 Premium free for 14 days. Easy signup, no commitment and, most importantly, instant access to 1000's of courses.
INTERACTIVE
Essential Information Security Program Planning
Security Innovation
15 mins
$99
Course OverviewThis course provides essential guidance to individuals with information security implementation and operational responsibilities for developing and disseminating an organization-wide information security program plan to facilitate compliance with applicable regulatory requirements.Duration15 minutes
INTERACTIVE
Essential Risk Assessment
Security Innovation
15 mins
$99
Course OverviewThis course provides essential guidance to individuals with information system, security, and/or risk management and oversight responsibilities that include defining the purpose, scope, roles, management commitment, and coordination among organizational entities to help ensure compliance with applicable regulatory requirements.Duration15 minutes
INTERACTIVE
Essential Secure Configuration Management
Security Innovation
15 mins
$99
Course OverviewThis course provides essential guidance to program managers, system designers and developers responsible for the effective implementation of selected security controls and control enhancements to help ensure compliance with applicable regulatory requirements.Duration15 minutes
INTERACTIVE
Fundamentals of Security Testing
Security Innovation
20 mins
$99
Course OverviewIn this course you will learn about the different fundamental types of security testing. By the end of this course you will understand: threat modeling, how threat modeling applies in the design phase of the SDLC, approaches to threat modeling, vulnerability scanning, penetration testing, static analysis pros and cons, code review pros and cons.Duration20 minutes
INTERACTIVE
Creating Secure jQuery Code
Security Innovation
1 hr 30 mins
$99
Course OverviewIn this course, you will learn about common client-side vulnerabilities and threats to jQuery applications, and techniques for mitigating these vulnerabilities and threats. You will also learn about how to implement new HTML5 security features to secure JQuery applications, and best practices to secure local storage and implement transport layer security. After completing this course, you will be able to describe the threats that can impact your jQuery code and describe the countermeasures to address these threats.Duration1 hour and 30 minutes
INTERACTIVE
Essential Account Management Security
Security Innovation
15 mins
$99
Course OverviewThis course provides essential guidance to information system managers, designers and program managers on implementing specific account management security controls at the hardware and software level to facilitate compliance with applicable regulatory requirements.Duration15 minutes
INTERACTIVE
Essential Application Protection
Security Innovation
15 mins
$99
Course OverviewThis course provides essential guidance to system designers and developers on implementing specific application security controls at the software level to facilitate compliance with applicable regulatory requirements.Duration15 minutes
INTERACTIVE
Essential Security Engineering Principles
Security Innovation
15 mins
$99
Course OverviewThis course provides essential guidance to program managers, system designers, developers, information security engineers and systems integrators responsible for applying security-engineering principles to new development information systems or systems undergoing major upgrades.Duration15 minutes
INTERACTIVE
Essential Security Audit and Accountability
Security Innovation
15 mins
$99
Course OverviewThis course provides essential guidance to information system owners, system administrators, and information system security officers developing procedures to facilitate the implementation of the audit and accountability policy and controls to facilitate compliance with applicable regulatory requirements.Duration15 minutes
INTERACTIVE
Essential Incident Response
Security Innovation
15 mins
$99
Course OverviewThis course provides essential guidance to individuals with information security implementation and operational responsibilities for implementing an incident response policy and associated controls to help ensure compliance with applicable regulatory requirements.Duration15 minutes
Find training fasterLooking for project management or sales training? Or a face-to-face first aid course? Your GO1 Training Assistant can help you find and book the right training for you – at the best price.
Content image
CommunityBlogPartners
© Copyright 2019 GO1 - All Rights Reserved