Microsoft Azure AD B2C

This Azure AD B2C training course teaches developers how to work with the Azure AD B2C service, how to integrate it into their applications, and how to customize its appearance and behavior. Developers will also learn how to create and configure Azure AD B2C custom policies, how to use the Microsoft Graph API to manage…

AZ-500: Microsoft Azure Security Technologies

In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.

Docker Security

Building containerized applications has revolutionized the process of developing and running microservices.  Instead of worrying about underlying system dependencies, container images include all of the necessary components to run an application on any platform, they are much smaller which makes them more portable, and enables simplified autoscaling. Docker is designed to make it easier to…

Certified Information System Security Professional (CISSP 2015)

The Certified Information System Security Professional (CISSP 2015) is designed to expand upon the student’s existing knowledge, and is intended for experienced IT professionals. THe course covers the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals.

Identity and Access Control for Modern Web Applications

Modern application design has changed quite a bit in recent years. “Mobile-first” and “cloud-ready” are the types of applications you are expected to develop. Additionally, Microsoft has revamped their web stack with OWIN, Katana, and ASP.NET Core to keep pace with these architectural demands.

Developing Secure .NET Web Applications

Security experts agree that the least effective approach to security is "penetrate and patch". It is far more effective to "bake" security into an application throughout its lifecycle. Learn how the experts build security into their applications by walking through the entire development lifecycle of an application from a security perspective.

Developing Secure Java Web Applications

Security experts agree that the least effective approach to security is "penetrate and patch". It is far more effective to "bake" security into an application throughout its lifecycle. Learn how the experts build security into their applications by walking through the entire development lifecycle of an application from a security perspective.

Developing Secure .NET Web Application Development – Lifecycle (SDLC)

Security experts agree that the least effective approach to security is "penetrate and patch". It is far more effective to "bake" security into an application throughout its lifecycle. Learn how the experts build security into their applications by walking through the entire development lifecycle of an application from a security perspective.

Developing Secure Java Web Application Development – Lifecycle (SDLC)

Security experts agree that the least effective approach to security is "penetrate and patch". It is far more effective to "bake" security into an application throughout its lifecycle. Learn how the experts build security into their applications by walking through the entire development lifecycle of an application from a security perspective.