Introducing Information Security & Charting a Career Path Training Course
Target Audience:
This course is tailored for individuals eager to grasp the fundamentals of information security and explore viable career trajectories within the sector. It welcomes participants from varied backgrounds, including those with minimal prior technical experience.
Course Objectives:
Participants will:
- Acquire a comprehensive understanding of core information security concepts and principles.
- Identify major threats and vulnerabilities in the digital landscape.
- Explore diverse career options and specializations available in information security.
- Establish a solid foundation for continued learning and professional exploration.
Course Format:
- Interactive lectures paired with group discussions.
- Practical exercises accompanied by feedback sessions.
- Participants are encouraged to submit questions and engage actively in discussions.
This agenda is adaptable and may be modified based on time limits and audience interests. Customized iterations may incorporate interactive elements such as quizzes, polls, and collaborative discussions.
The course will also provide resources and information on further educational opportunities, professional organizations, and career development tools.
Customization Options
- To request a customized version of this training, please contact us to arrange the details.
Course Outline
Welcome & Introduction - Course overview and objectives
The Information Security Landscape
- Defining information security: Confidentiality, Integrity, and Availability (the CIA triad)
- Data classifications and sensitivity levels
- Understanding common cyber threats (malware, phishing, social engineering, etc.)
- Real-world case studies of information security breaches
Building Your Information Security Arsenal
- Essential security controls: Access control, encryption, firewalls, intrusion detection
- Implementing secure practices: Password management, multi-factor authentication (MFA), data backups
- Understanding security frameworks and standards (NIST, ISO 27001)
Navigating the Information Security Career Landscape
- Overview of diverse career paths available (Security Management, Governance, Risk, and Compliance (GRC), Security Analyst, Penetration Tester, Incident Responder, etc.)
- Understanding the skills and qualifications required for different roles
- Exploring educational and certification options
- Q&A with industry professionals (optional)
Specialising in the Security Realm
- Deep dive into specific security domains: Network security, cloud security, application security, data security
- Emerging trends and future directions in information security - AI, Culture Change
- Career growth and advancement opportunities
Hands-on Activity: Applying Security Concepts
- Interactive scenario-based exercise to put theory into practice
- Group discussion and collaborative problem-solving
Charting Your Course: Actionable Steps
- Developing a personalized career roadmap
- Identifying resources for further learning and networking
- Q&A and open discussion
Course Wrap-up and Feedback
- Key takeaways and concluding remarks
- Feedback form and evaluation
Requirements
No specific technical skills or knowledge are required; however, a reasonable familiarity with common technologies such as the Internet and standard IT tools (e.g., MS Office) is helpful.
Open Training Courses require 5+ participants.
Introducing Information Security & Charting a Career Path Training Course - Booking
Introducing Information Security & Charting a Career Path Training Course - Enquiry
NobleProg offers professional training programs designed specifically for companies and organizations. These trainings are not intended for individuals.
Introducing Information Security & Charting a Career Path - Consultancy Enquiry
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions
Adam - Fireup.PRO
Course - Advanced Java Security
The topic is current and I needed to be updated
Damilano Marco - SIAP s.r.l.
Course - Secure Developer Java (Inc OWASP)
Upcoming Courses
Related Courses
Android Security
14 HoursAndroid is an open-source platform designed for mobile devices, including smartphones and tablets. It offers a wide range of security features to facilitate the development of secure software; however, it lacks certain security aspects found in other mobile platforms. This course provides a comprehensive overview of these features and highlights the most critical shortcomings related to the underlying Linux environment, the file system, and the general runtime environment, as well as issues concerning permissions and other Android development components.
The course describes typical security pitfalls and vulnerabilities affecting both native code and Java applications, along with recommendations and best practices to prevent and mitigate them. Many of the discussed issues are supported by real-life examples and case studies. Finally, a brief overview is provided on using security testing tools to identify security-related programming bugs.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Learn about the security solutions available on Android
- Learn to utilize various security features of the Android platform
- Gain information about recent Java vulnerabilities on Android
- Learn about typical coding mistakes and how to avoid them
- Gain an understanding of native code vulnerabilities on Android
- Realize the severe consequences of insecure buffer handling in native code
- Understand architectural protection techniques and their weaknesses
- Obtain sources and further readings on secure coding practices
Audience
Professionals
Network Security and Secure Communication
21 HoursImplementing a secure networked application can be challenging, even for developers who have prior experience with cryptographic building blocks such as encryption and digital signatures. To ensure participants grasp the role and usage of these cryptographic primitives, the course first establishes a solid foundation on the core requirements of secure communication—including secure acknowledgment, integrity, confidentiality, remote identification, and anonymity. It also highlights typical threats that can compromise these requirements, alongside real-world solutions.
Given that cryptography is a critical aspect of network security, the course discusses essential cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement. Rather than focusing on in-depth mathematical theory, these concepts are presented from a developer's perspective, featuring typical use-case examples and practical considerations such as public key infrastructures. Security protocols relevant to various areas of secure communication are introduced, with a detailed exploration of widely used protocol families like IPSEC and SSL/TLS.
The course also addresses common cryptographic vulnerabilities associated with specific algorithms and protocols, including BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding Oracle, Lucky Thirteen, POODLE, and RSA timing attacks. For each issue, practical implications and potential consequences are described, without delving into complex mathematical details.
Finally, as XML technology plays a central role in data exchange for networked applications, the course covers the security aspects of XML. This includes the use of XML within web services and SOAP messages, along with protection mechanisms such as XML Signature and XML Encryption. It also examines weaknesses in these protection measures and XML-specific security issues like XML injection, XML External Entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Understand the requirements of secure communication
- Learn about network attacks and defenses at different OSI layers
- Gain a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Get information about some recent related vulnerabilities
- Understand security concepts of Web services
- Get sources and further readings on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursThis three-day course provides a comprehensive overview of the fundamental principles for securing C/C++ code against potential exploitation by malicious actors. It focuses on addressing vulnerabilities related to memory management and input handling, equipping participants with the essential knowledge needed to write robust and secure software.
Advanced Java Security
21 HoursEven seasoned Java developers do not necessarily master all the security services provided by Java, nor are they always fully aware of the vulnerabilities relevant to web applications written in Java.
In addition to introducing the security components of Standard Java Edition, this course addresses security issues in Java Enterprise Edition (JEE) and web services. The discussion of specific services is preceded by an exploration of cryptography foundations and secure communication. Various exercises cover declarative and programmatic security techniques in JEE, while both transport-layer and end-to-end security for web services are examined. All components are demonstrated through practical exercises, allowing participants to personally experiment with the discussed APIs and tools.
The course also reviews and explains the most common and severe programming flaws in the Java language and platform, along with web-related vulnerabilities. Beyond the typical errors made by Java programmers, the introduced security vulnerabilities encompass both language-specific issues and problems arising from the runtime environment. All vulnerabilities and associated attacks are illustrated through accessible exercises, followed by recommended coding guidelines and potential mitigation techniques.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and know how to avoid them
- Understand the security concepts of web services
- Learn to utilize various security features of the Java development environment
- Gain a practical understanding of cryptography
- Understand the security solutions offered by Java EE
- Learn about typical coding mistakes and how to avoid them
- Receive information on some recent vulnerabilities in the Java framework
- Acquire practical knowledge in using security testing tools
- Obtain sources and further reading materials on secure coding practices
Audience
Developers
Standard Java Security
14 HoursDescription
The Java language and its Runtime Environment (JRE) were engineered to eliminate the most prevalent and dangerous security vulnerabilities commonly found in other languages, such as C and C++. However, software developers and architects must do more than simply utilize the positive security features available within the Java ecosystem; they must also maintain a keen awareness of the numerous vulnerabilities that remain pertinent to Java development, often referred to as 'negative security.'
The course introduces security services by first providing a concise overview of cryptographic foundations. This establishes a common baseline for understanding the purpose and mechanics of the relevant components. Participants will apply this knowledge through practical exercises, allowing them to experiment with the discussed APIs firsthand.
Furthermore, the course examines the most frequent and severe programming flaws inherent to the Java language and platform. This includes both typical errors made by Java developers and issues specific to the language and its environment. All vulnerabilities and corresponding attack vectors are illustrated through accessible exercises, followed by recommended coding guidelines and effective mitigation strategies.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding
- Explore Web vulnerabilities extending beyond the OWASP Top Ten and learn how to prevent them
- Learn to leverage various security features within the Java development environment
- Gain a practical understanding of cryptography
- Identify typical coding mistakes and learn how to avoid them
- Stay informed about recent vulnerabilities in the Java framework
- Receive resources and further reading materials on secure coding practices
Audience
Developers
.NET, C# and ASP.NET Security Development
14 HoursToday, numerous programming languages enable the compilation of code for the .NET and ASP.NET frameworks. While these environments offer robust security development capabilities, developers must understand how to apply architectural and coding-level techniques to implement desired security features, prevent vulnerabilities, and mitigate their potential exploitation.
This course aims to equip developers with the skills to prevent untrusted code from executing privileged actions, protect resources through strong authentication and authorization, manage remote procedure calls, handle sessions, and explore various functional implementations, among other topics, through extensive hands-on exercises.
The course introduces various vulnerabilities by examining typical programming errors associated with .NET. The discussion on ASP.NET vulnerabilities covers diverse environment settings and their impacts. Additionally, the section on ASP.NET-specific vulnerabilities addresses general web application security challenges as well as specialized issues and attack vectors, such as ViewState attacks and string termination exploits.
Participants attending this course will
- Gain an understanding of fundamental security concepts, IT security, and secure coding principles
- Learn about web vulnerabilities beyond the OWASP Top Ten and how to prevent them
- Acquire knowledge of the various security features available in the .NET development environment
- Develop practical skills in utilizing security testing tools
- Identify common coding mistakes and learn strategies to avoid them
- Stay informed about recent vulnerabilities in .NET and ASP.NET
- Access resources and further readings on secure coding practices
Audience
Developers
The Secure Coding Landscape
14 HoursThis course introduces key security concepts and provides an overview of vulnerabilities across different programming languages and platforms. It explains how to manage software security risks throughout the various stages of the software development lifecycle. Without delving into technical specifics, it highlights some of the most prevalent and critical vulnerabilities in modern software development technologies. The course also addresses the challenges of security testing, offering techniques and tools to help identify existing issues in code.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding.
- Gain insight into web vulnerabilities affecting both server and client sides.
- Recognize the severe consequences of improper buffer handling.
- Learn about recent vulnerabilities found in development environments and frameworks.
- Identify typical coding mistakes and learn how to avoid them.
- Understand security testing approaches and methodologies.
Audience
Managers
Secure coding in PHP
21 HoursThis course equips PHP developers with the essential skills needed to build applications that are resilient against modern Internet-based threats. It explores web vulnerabilities through practical PHP examples, extending beyond the OWASP Top Ten to address a wide range of injection attacks, script injections, session handling weaknesses, insecure direct object references, file upload issues, and more. PHP-specific vulnerabilities are categorized into standard types, such as missing or inadequate input validation, incorrect error and exception handling, misuse of security features, and time- or state-related flaws. Specific attacks discussed include open_basedir circumvention, denial-of-service via magic float, and hash table collision attacks. In each scenario, participants will learn the critical techniques and functions required to mitigate these risks.
A dedicated focus is placed on client-side security, addressing issues related to JavaScript, Ajax, and HTML5. The course introduces various PHP security extensions, including hash, mcrypt, and OpenSSL for cryptography, as well as Ctype, ext/filter, and HTML Purifier for input validation. Comprehensive hardening practices are covered, relating to PHP configuration (php.ini), Apache, and general server settings. Additionally, an overview is provided of various security testing tools and techniques available to developers and testers, such as security scanners, penetration testing, exploit kits, sniffers, proxy servers, fuzzing tools, and static source code analyzers.
Both the explanation of vulnerabilities and the configuration practices are reinforced through hands-on exercises that demonstrate the impact of successful attacks, illustrate how to apply mitigation strategies, and introduce the use of relevant extensions and tools.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and know how to prevent them
- Gain knowledge of client-side vulnerabilities and secure coding practices
- Develop a practical understanding of cryptography
- Learn to utilize various security features in PHP
- Identify common coding mistakes and learn how to avoid them
- Stay informed about recent vulnerabilities in the PHP framework
- Acquire practical experience with security testing tools
- Access resources and further reading on secure coding practices
Audience
Developers
Microsoft SDL Core
14 HoursThis comprehensive SDL Core training offers an in-depth look at secure software design, development, and testing methodologies through the lens of the Microsoft Secure Development Lifecycle (SDL). It provides a Level 100 overview of the fundamental building blocks of the SDL, followed by design techniques to help participants detect and remediate flaws early in the development process.
Focusing on the development phase, the course reviews common security-related programming bugs found in both managed and native code. It presents attack vectors for the discussed vulnerabilities alongside their mitigation techniques, all illustrated through practical exercises that engage participants with live hacking demonstrations. The training also introduces various security testing methods and demonstrates the effectiveness of different testing tools. Participants gain a practical understanding of these tools by applying them to previously discussed vulnerable code in hands-on exercises.
Participants attending this course will
Understand the core concepts of security, IT security, and secure coding
Become familiar with the essential steps of the Microsoft Secure Development Lifecycle
Learn secure design and development practices
Learn about secure implementation principles
Understand security testing methodology
- Access sources and further readings on secure coding practices
Audience
Developers, Managers
Security Testing
14 HoursOnce participants have become familiar with vulnerabilities and attack vectors, they will learn the general approach and methodology for security testing, as well as the techniques used to uncover specific vulnerabilities. The process begins with information gathering about the system under evaluation (ToC), followed by thorough threat modeling to identify and rate all potential threats, ultimately leading to a risk analysis-driven test plan.
Security evaluations occur at various stages of the Software Development Life Cycle (SDLC). This course covers design reviews, code reviews, reconnaissance, and information gathering about the system, as well as testing the implementation and hardening the environment for secure deployment. Detailed techniques such as taint analysis, heuristics-based code review, static code analysis, dynamic web vulnerability testing, and fuzzing are introduced. Participants will be exposed to various tools designed to automate the security evaluation of software products. These tools are reinforced through hands-on exercises, where participants execute them to analyze previously discussed vulnerable code. Additionally, numerous real-life case studies are provided to enhance understanding of different vulnerabilities.
This course prepares testers and QA staff to effectively plan and execute security tests, select and use the most appropriate tools and techniques to uncover hidden security flaws, and provides essential practical skills applicable immediately in the workplace.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and how to mitigate them
- Gain knowledge of client-side vulnerabilities and secure coding practices
- Understand security testing approaches and methodologies
- Acquire practical experience in using security testing techniques and tools
- Access resources and further reading materials on secure coding practices
Audience
Developers, Testers
Secure Web Application Development and Testing
21 HoursProtecting web-accessible applications demands well-prepared security professionals who remain constantly aware of current attack vectors and trends. A vast array of technologies and environments exists that facilitate the comfortable development of web applications. Professionals must not only be aware of security issues specific to these platforms but also of general vulnerabilities that apply regardless of the development tools used.
This course provides an overview of applicable security solutions for web applications, with a special focus on understanding the most important cryptographic solutions to be implemented. Various web application vulnerabilities are presented on both the server side (following the OWASP Top Ten) and the client side, demonstrated through relevant attacks, and followed by recommended coding techniques and mitigation methods to avoid associated problems. The subject of secure coding is concluded by discussing typical security-relevant programming mistakes in the areas of input validation, improper use of security features, and code quality.
Testing plays a crucial role in ensuring the security and robustness of web applications. Various approaches – from high-level auditing and penetration testing to ethical hacking – can be applied to identify vulnerabilities of different types. However, if you want to go beyond easily found low-hanging fruits, security testing must be well-planned and properly executed. Remember: security testers should ideally find all bugs to protect a system, whereas for adversaries, it is sufficient to find just one exploitable vulnerability to penetrate it.
Practical exercises will aid in understanding web application vulnerabilities, programming mistakes, and most importantly, mitigation techniques. Together with hands-on trials of various testing tools – from security scanners and sniffers to proxy servers, fuzzing tools, and static source code analyzers – this course provides essential practical skills that can be applied the very next day in the workplace.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and know how to avoid them
- Learn about client-side vulnerabilities and secure coding practices
- Gain a practical understanding of cryptography
- Understand security testing approaches and methodologies
- Acquire practical knowledge in using security testing techniques and tools
- Be informed about recent vulnerabilities in various platforms, frameworks, and libraries
- Get sources and further readings on secure coding practices
Audience
Developers, Testers
DevOps Security: Creating a DevOps Security Strategy
7 HoursIn this instructor-led, live course in France, participants will learn how to develop an effective security strategy to address the challenges of DevOps security.
EC-Council Certified DevSecOps Engineer (ECDE)
28 HoursThe EC-Council Certified DevSecOps Engineer (ECDE) certification offers a practical curriculum designed to empower professionals with the expertise needed to integrate security throughout the DevOps lifecycle, ensuring robust software protection from initial planning through to deployment.
Delivered via instructor-led live sessions (available online or on-site), this training targets intermediate-level software engineers and DevOps practitioners aiming to embed security controls into CI/CD pipelines for secure and compliant code delivery.
Upon completion, participants will be capable of:
- Mastering the core principles and methodologies of DevSecOps.
- Securing every phase of the CI/CD pipeline using automation tools.
- Executing secure coding standards and vulnerability assessment techniques.
- Effectively preparing for the ECDE certification through extensive hands-on labs and review.
Course Format
- Engaging lectures and interactive discussions.
- Practical application of DevSecOps tools within simulated pipeline environments.
- Guided exercises emphasizing secure development and deployment strategies.
Customization Options
- For tailored training aligned with your team’s specific workflows or technology stack, please reach out to us to arrange.
How to Write Secure Code
35 HoursThis course aims to assist with the following objectives:
- Enable developers to master the techniques of writing secure code.
- Assist software testers in verifying application security prior to deployment in the production environment.
- Help software architects comprehend the risks associated with their applications.
- Support team leaders in establishing security baselines for developers.
- Guide web masters in configuring servers to prevent misconfigurations.
Secure Developer Java (Inc OWASP)
21 HoursThis course explores secure coding concepts and principles in Java, guided by the testing methodology of the Open Web Application Security Project (OWASP). OWASP is an online community dedicated to producing freely accessible articles, methodologies, documentation, tools, and technologies focused on web application security.