ASP.NET Core 3 Development

This ASP.NET Core Development course introduces attendees to this new platform and teaches attendees the skills necessary to design and build well-architected web and service-oriented applications that follow the MVC design pattern. Bring this course onsite to your business.

Identity and Access Control for Modern Web Applications

Modern application design has changed quite a bit in recent years. “Mobile-first” and “cloud-ready” are the types of applications you are expected to develop. Additionally, Microsoft has revamped their web stack with OWIN, Katana, and ASP.NET Core to keep pace with these architectural demands.

Docker Head to Toe

Docker, the premier platform for containerization, has become a mainstay for developers and IT pros alike for supporting continuous integration and DevOps.

Angular Application Development

Angular 2 is the new version of Google’s popular Single Page Application framework that can be used to build robust, client-centric applications. With enhanced speed, the ability to leverage the latest language features and a more modular architecture, Angular offers a cutting-edge approach to building today’s applications.

Developing Secure .NET Web Applications

Security experts agree that the least effective approach to security is "penetrate and patch". It is far more effective to "bake" security into an application throughout its lifecycle. Learn how the experts build security into their applications by walking through the entire development lifecycle of an application from a security perspective.

Developing Secure Java Web Applications

Security experts agree that the least effective approach to security is "penetrate and patch". It is far more effective to "bake" security into an application throughout its lifecycle. Learn how the experts build security into their applications by walking through the entire development lifecycle of an application from a security perspective.

Developing Secure .NET Web Application Development – Lifecycle (SDLC)

Security experts agree that the least effective approach to security is "penetrate and patch". It is far more effective to "bake" security into an application throughout its lifecycle. Learn how the experts build security into their applications by walking through the entire development lifecycle of an application from a security perspective.