Ray Friedman's Mile2.com Now Offers Courses for Certified Secure Web Application Engineer
Tampa, Fl, Jan 17, 2013 (PRWeb.com via COMTEX) --
Mile2 is a very well-known name in the industry of cyber security training. Graduates of the mile2 Certified Secure Web Application Engineer training obtain a real world security knowledge that enables them to recognize vulnerabilities, exploit system weaknesses and help safeguard against threats.
"This course is designed to equip attendees with the knowledge and tools needed to identify and defend against security vulnerabilities in software applications." said Raymond Friedman, CEO at Mile2.
Students will put theory to practice by completing real world labs that include testing applications for software vulnerabilities, identifying weaknesses in design through architecture risks analysis and threat modeling, conducting secure code reviews and more.
On the final day of training, students will complete a real world hacking exercise on a live web application.
Upon completion, attendees should have the skills to perform the following:
Identify application security vulnerabilities in any software application
Review software architecture diagrams and identify attack points
Perform web application penetration testing
Identify vulnerabilities as they relate to the OWASP Top 10
Perform advanced attacks against web applications
Design controls to defend against application vulnerabilities
Perform security code reviews
Develop security test scripts
Build a web hacking toolbox
Integrate security best practices into the Software Development Lifecycle (SDLC)
Communicate to both technical and non-technical individuals concerning application vulnerabilities
Objective Of Labs:
This is an intensive hands-on class; you will spend 50% of student class time performing labs focusing on both the OWASP model as well as the technicalities that detail PCI compliance in respects to secure coding.
Certified Secure Web Application Engineer Module Topics:
Module 0: Web Application Intro
Module 1: Software Security Explained
Module 2: Risk Management
Module 3: Secure Architecture Design
Module 4: OWASP Top 10
Module 5: Threat Modeling
Module 6: Software Security Vulnerabilities
Module 7: Other Vulnerabilities
Module 8: Overview of Secure Coding
Module 9: Secure Coding Principles
Module 10: Secure Software Development Lifecycle
Module 11: PCI Data Security Standard
Module 12: Web 2.0
Module 13: Other Key Items
Module 14: Selling Security to Management
Module 15: Web Application Penetration Testing
About the company:
Mile2(R) was developed in response to the threat of corporate and national information security attacks in the aftermath of 9/11. Being a globally respected IT security organization, mile2(R), focuses on security training for national and corporate entities who understand the value of "knowing your enemy." By training businesses and organizations to think like an attacker, mile2(R) helps clients ensure that their intellectual property and data remain secure. Mile(R)2's overarching goal is to establish and contribute to a universal standard that has been adopted by government, military and corporate organizations whose intellectual property, secrets and infrastructure assets are significant strategic targets for entities with malicious and criminal intent. To learn more visit http://www.mile2.com/
Read the full story at http://www.prweb.com/releases/raymond-friedman/mile2/prweb10332665.htm
[ InfoTech Spotlight's Homepage ]