HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training
|
|
- Jerome Price
- 8 years ago
- Views:
Transcription
1 HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training HP and HP Enterprise Security Products are committed to your success as an HP Partner. In the Fortify Proof of Concept Boot Camp Training, our ESP partner presales and architecture team members can build the skills that will equip them to represent and position HP Fortify solutions and effectively deliver Fortify solution proof of concept engagements. Participants in the Boot Camp typically are partner resources who engineer solutions for their customers and are capable and experienced in the delivery of demonstrations and proof of concepts. HP Fortify Partner Enablement training allows HP Partners to effectively deliver compelling and effective security solutions for their customers. This two day training course covers technical presales and architecture components of the Fortify portfolio including SAST, DAST, RAST, and FOD via classroom content and real world examples. For more information about HP Fortify portfolio, visit Course Overview This training event consists of distinct sessions, each with its own registration to allow for flexibility in attendance. More information about each session can be found below: Session Day HP ExpertOne Fortify Security Solutions ATP Prep Day The first day of the Fortify Boot camp is focused on Partner s pre-sales and architect team members and provides a single day of intensive preparation for the HP ExpertOne Fortify Security Solutions HP0-A0 ExpertOne ATP examination. Through lectures and hand-on activities the student will validate they have the competencies to implement HP Fortify Static Code Analyzer, Software Security Center, WebInspect and Fortify Runtime After completing this course, the student should be able to determine if they are sufficiently skilled to sit the HP0-A0 ExpertOne Examination. Attendees of this day will receive a voucher to take the HP0-A0 Fortify Security Solutions ATP ExpertOne examination. Session Day - HP Fortify Proof of Concept Boot Camp The next three days are the Fortify Proof of Concept boot camp focused on Partner s pre-sales and architect team members. On the first day we will lay down the foundations of addressing strategic and winning proposals for HP Fortify where a Proof of Concept is requested or required. Using two PoC examples as the basis, we will exercise all necessary activities which drive a PoC that has an optimum result PoC including: Guidance to conduct PoC with HP Fortify Solution Products Give attendees a base understanding of HP Fortify product suite and the goals of a Proof of Value/Concept with HP Fortify solution products versus a demo. Outlining the PoV concept - Prerequisites and things to know before a PoV Dramatization of Value / Benefits (demonstration of common use cases / work flows tailored to Prospect circumstances) Understanding the Technical considerations - What's essential to successfully conduct a PoV HP Fortify SCA and HP WebInspect specifics
2 On the second day, of the Boot Camp we will build additional product awareness through POC practice including HP Fortify: Hands-on with configuration and use cases Ability to Troubleshoot Common Problems HP WebInspect: Hands-on with configuration and use cases Introduction to RASP - Application Defender Fortify on Demand PoC & On-boarding Presenting the results - What's good to show to customers The third day of the Boot Camp addresses advanced POC topics including: Advanced Auditing Best Practice Intro to Custom Rules - when to use and when not to Basic scan debugging and troubleshooting Basic security remediation Intro to custom rules Deep dive with various common languages FoD Deep-dive Static and Dynamic Analysis Objection handling Session Day HP Fortify Day with Product Management The last day of the Fortify boot camp is the Fortify Day with Product Management and is focused on a partner s Sales and Pre Sales team members. Attendees are presented with the Fortify Solution Products portfolio and will learn how HP Fortify fits in the bigger HP Enterprise Security Products (ESP) picture and how to deliver the right messages about Fortify to potential customers. By attending the session the attendees will learn about customers use cases and key selling points when facing customers with Application Security requirements. In addition, Fortify Product Managers will introduce new solution products as well as packaging and licensing. Pre requisites Day ATP Prep Day: months HP Fortify experience, or completion of Fortify Security Solutions - ATP course - Day - PoC Boot Camp is technical in nature, frequently addressing complex topics and materials. It is expected that attendees: Are familiar with the processes for SDLC. Are familiar with the Fortify solution set and general scope Have a good understanding of software risks, including what are XSS, SQLi, forceful browsing, invalidated inputs, Buffer Overflows/Overruns. (See OWASP site) SAST: Understanding of programming processes and toolsets including the use of IDE and Build servers. Basic working knowledge of the Fortify SAST products, particularly SCA (multiple OS) and SSC Server (multiple OS, Java app) DAST: Basic working knowledge of the Fortify DAST products, particularly WebInspect (desktop). Understanding of vulnerability scanning techniques including Crawling (Discovery) and Auditing (Attacks) as well as Manual methods. Working knowledge on networks and their general operation, including proxies, intercept proxy tools, and the uses and effects of IPS/IDS RAST: Basic working knowledge of the Fortify RAST products, particularly Runtime (RTAL/RTAP) Day Day with Product Management session requires some knowledge and some experience with Application Security technologies. Sales and Pre Sales should record skills in understanding customer requirements considering security monitoring and cyber defense. Technical Requirements What Attendees Need to Bring Most training content is delivered as slides, hand outs and white boarding. For hands on labs, please bring a lap top computer. We will have an installation of Fortify software for you to use during the session. Use of a tablet in these sessions is not recommended unless you have keyboard and mouse. Web browser requirements:
3 Chrome + Firefox + Safari HTML Important: Your HP Learner ID Along with your name and address, your HP Learning Center Learner ID will be used to register and track your attendance and recognize your partner organization for your training. If you do not have a HP Learner ID, please visit the HP Learner ID for Partners page to request your learner ID at: esstolc-upp-gpp.pdf A quick reference card with the steps to obtain the learner ID can also be found via a link at the bottom of that page. Please note that it can take up to three days for this to be processed, so start this activity early.
4 Course Modules Overview Below is a short overview of the modules covered during the different Boot Camp sessions. Breaks are organized every 90mn and lunch will be in the middle of the day. DAY---- Fortify Security Solutions ATP Prep Day Welcome Introduction Session presentation and objectives HP ESP & Fortify Overview Overview of HP ESP, the current state of Software Security, and the entire Fortify product suite static, dynamic, and run-time protection and purpose of each Common Software Development Application Security Methodologies OWASP Top 0 FSIMM OpenSAMM Microsoft SDL Implementation of Fortify Products Architecture of the Fortify Solution Software Security Center (SSC) Static Code Analyser (SCA) WebInspect Enterprise (WIE) Application Defender Software Security Threat Agents Insider threats vs. Outsider threats Day Fortify PoC Boot camp Session Introduction and goals An introduction to the team, discuss expectations and set goals HP ESP & Fortify Overview Overview of HP ESP, the current state of Software Security, and the entire Fortify product suite static, dynamic, and run-time protection and purpose of each Outlining HP Fortify Proof of Value/Concept This module will focus on the POC aspect from a business, sales, and troubleshooting perspective. PoC Best Practices & Common Mistakes & Software Security Assurance Deeper dive into the overall components of a POC and SSA process to include troubleshooting tactics, common mistakes made, and recommendations for success. Operational Proficiency: Issue Triage & Lab This is a hands-on Static Analysis module series. In this session, individuals will learn how to use Fortify SCA, Audit Workbench, Command-line Utility, and Software Security Center. During this module, the installation of the demonstration environment will take place and static analysis will be performed on sample source code to assess, triage, and promote vulnerability findings within the SDLC. SCA, SSC, AWB, IDE POC & Workflows 7 8 Operational Proficiency: Project configuration This module extends the Issue Triage & Lab session. This is a hands-on learning session on how to manage and maintain vulnerability findings through custom filters, folders, and tags. Operational Proficiency: Collaboration This module extends the Issue Triage & Lab session. This is a hands-on learning session on how to leverage SSC Governance and integrate with the IDE plugin. Day Fortify POC Boot camp Intro to Dynamic & Integrated Analysis - WebInspect Overview of HP WebInspect Standalone, Real-Time, and Enterprise versions and purpose of each Operational Proficiency: Blackbox & Ops A deep dive module on Dynamic Analysis security testing to address security concerns in web sites, web services, and mobile application components. This module is feature rich and will cover the most important aspects to help you deliver meaningful results to prospects and customers.
5 Intro to SaaS - FoD & Application Defender SaaS is a major differentiator for HP Fortify. This module series is a hands-on deep dive into Fortify on Demand and Application Defender. Operational Proficiency: RASP This module will involve the installation, verification, and configuration of Application Defender. This is a deep-dive hands-on session to introduce the newest Gartner Magic Quadrant category Real-time Application Self-Protection. Operational Proficiency: SaaS This module will go into the details of Static, Dynamic, and Mobile Application Testing methodologies in the Cloud. This module will cover the differences and similarities of an on premise vs. in-the-cloud solution. Back-office operations and complexity and scale of the overall solution will also be discussed. Intro to Advanced Auditing Best Practices Practical Custom Rules Day Fortify POC Boot camp Deep Dive with.net & Java Deep Dive with C & C++ Deep Dive with Objective-C, Ruby & Others Fortify on Demand Deep Dive Build Integration Bug-tracker Integration Integration with FoD on Premise Data export to GRC or other management information systems FoD API Playbook Overview Day Day with Product Management Fortify Security Strategy Fortify Architecture and Design How to Sell the Fortify Product suite Facing our competitors Competitive update Product Roadmap and Updates SCA/SSC/tools WI/WIE Runtime products FoD/SaaS upgrades and migrations, obsolescence 7 Marketing campaigns, SPIFFs, programs Learn more at arrowecs.de
Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company
Product Roadmap Sushant Rao Principal Product Manager Fortify Software, a HP company Agenda Next Generation of Security Analysis Future Directions 2 Currently under investigation and not guaranteed to
More informationHP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA lvonstockhausen@hp.com +49 1520 1898430 Enterprise Security
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA lvonstockhausen@hp.com +49 1520 1898430 Enterprise Security The problem Cyber attackers are targeting applications
More informationIs your software secure?
Is your software secure? HP Fortify Application Security VII konferencja Secure 2013 Warsaw - October 9, 2013 Gunner Winkenwerder Sales Manager Fortify CEE, Russia & CIS HP Enterprise Security +49 (172)
More informationFortify Training Services. Securing Your Entire Software Portfolio FRAMEWORK*SSA
Fortify Training Services Securing Your Entire Software Portfolio FRAMEWORK*SSA Fortify s holistic approach to application security truly safeguards our enterprise against today s ever-changing security
More informationIntroduction. Secure Software Development 9/03/2015. Matias starts. Daan takes over. Matias takes over. Who are we? Round of introductions
Matias starts Who are we? Applying Static Analysis Matias Madou and Daan Raman, Leuven, Feb 27, 2015 1 At NVISO, I m responsible for the software security practice. Next to the client work, I also leads
More informationAccelerating Software Security With HP. Rob Roy Federal CTO HP Software
Accelerating Software Security With HP Rob Roy Federal CTO HP Software If we were in a cyberwar today, the United States would lose. Mike McConnell Former DNI, NSA. Head of Booz Allen Hamilton National
More informationHP Fortify application security
HP Fortify application security Erik Costlow Enterprise Security The problem Cyber attackers are targeting applications Networks Hardware Applications Intellectual Property Security Measures Switch/Router
More informationFrom the Bottom to the Top: The Evolution of Application Monitoring
From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:
More informationIoT Potential Risks and Challenges
IoT Potential Risks and Challenges GRIFES / GITI / EPFL Alumni Conference, Lausanne, May 7 th, 2015 Stefan Schiller, HP ESP Fortify Solution Architect D/A/CH IoT Potential Risks and Challenges Agenda IDC
More informationHP Fortify Software Security Center
HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)
More informationApplication Security Testing How to find software vulnerabilities before you ship or procure code
Application Security Testing How to find software vulnerabilities before you ship or procure code Anita D Amico, Ph.D. Hassan Radwan 1 Overview Why Care About Application Security? Quality vs Security
More informationWho, What, Where, How: Five Big Questions in Mobile Security
Who, What, Where, How: Five Big Questions in Mobile Security Jacob West CTO, Fortify Products HP Enterprise Security Session ID: ASEC-R31 Session Classification: Intermediate Why is mobile security an
More informationCloud & Datacenter Monitoring with System Center Operations Manager
Page 1 of 5 Overview This course equips students with the skills they require to deploy and configure System Center 2012 R2 Operations. Using hands-on labs, students learn the following: How to architect
More informationPartner Enablement Training PRESENTED BY: TABLEAU PARTNER TEAM
Partner Enablement Training PRESENTED BY: TABLEAU PARTNER TEAM Welcome On behalf of Tableau s Global Channel, we welcome you to Tableau s Partner Enablement Training! It is because of you that this program
More informationArchitecting HP Cloud Solutions, Rev. 13.21
mm HP ExpertOne Architecting HP Cloud Solutions, Rev. 13.21 Course data sheet Certification(s) supported by this course: Exam(s): Format: Duration: Course ID: HP ASE Cloud Architect V2 HP0-D17 (Architecting
More informationTesting Solutions to Tackle Application Security Checkpoint Technologies SQGNE. Jimmie Parson Checkpoint Technologies
Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE Jimmie Parson Checkpoint Technologies Welcome, Introductions Agenda Checkpoint Technologies Quick Corporate Overview Why do
More informationSecurity Tools - Hands On
Security Tools - Hands On SecAppDev 2014 Ken van Wyk, @KRvW! Leuven, Belgium 10-14 February 2014 Caveats and Warnings This is not a sales pitch for any product(s) If you want to talk to a sales person,
More informationFortify. Securing Your Entire Software Portfolio
Fortify 360 Securing Your Entire Software Portfolio Fortify Fortify s holistic approach to application security truly safeguards our enterprise against today s ever-changing security threats. Craig Schumard,
More informationIMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY How runtime application security monitoring helps enterprises make smarter decisions on remediation 2 ABSTRACT Enterprises today
More informationBringing Security Testing to Development. How to Enable Developers to Act as Security Experts
Bringing Security Testing to Development How to Enable Developers to Act as Security Experts Background: SAP SE SAP SE Business Software Vendor Over 68000 employees Worldwide development Myself Security
More informationApplication Security Center overview
Application Security overview Magnus Hillgren Presales HP Software Sweden Fredrik Möller Nordic Manager - Fortify Software HP BTO (Business Technology Optimization) Business outcomes STRATEGY Project &
More informationSecurity-as-a-Service (Sec-aaS) Framework. Service Introduction
Security-as-a-Service (Sec-aaS) Framework Service Introduction Need of Information Security Program In current high-tech environment, we are getting more dependent on information systems. This dependency
More informationThe Evolution of Enterprise Application Security. Why enterprises need runtime application self-protection
The Evolution of Enterprise Application Security Why enterprises need runtime application self-protection 2 Abstract Enterprise information security encompasses a broad set of disciplines and technologies,
More informationWhat s New in HP Fortify Software Security Center 4.20
What s New in HP Fortify Software Security Center 4.20 September 2014 This release of HP Fortify Software Security Center includes the 10.30 release of WebInspect and WebInspect Enterprise. The WebInspect
More informationVulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
More information! Resident of Kauai, Hawaii
SECURE SDLC Jim Manico @manicode! OWASP Volunteer! Global OWASP Board Member! Manager of several OWASP secure coding projects! Security Instructor, Author! 17 years of web-based, databasedriven software
More informationInformation Security: Enabling the Business Developing an Effective Application Security Program
Information Security: Enabling the Business Developing an Effective Application Security Program Bruce C Jenkins (bcj@hp.com) AppSec Program Strategist 04 April 2014 About me Commonwealth IT Security Conference
More informationWhat s New in HP Fortify Software Security Center 4.30 and HP WebInspect 10.40 Products
What s New in HP Fortify Software Security Center 4.30 and HP WebInspect 10.40 Products April 2015 This release of HP Fortify Software Security Center includes the 10.40 release of WebInspect and WebInspect
More informationGetting Started with Web Application Security
Written by Gregory Leonard February 2016 Sponsored by Veracode 2016 SANS Institute Since as far back as 2005, 1 web applications have been attackers predominant target for the rich data that can be pulled
More informationStarting your Software Security Assurance Program. May 21, 2015 ITARC, Stockholm, Sweden
Starting your Software Security Assurance Program May 21, 2015 ITARC, Stockholm, Sweden Presenter Max Poliashenko Chief Enterprise Architect Wolters Kluwer, Tax & Accounting Max leads the Enterprise Architecture
More informationTHE EVOLUTION OF ENTERPRISE APPLICATION SECURITY
THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY Why enterprises need runtime application self-protection 2 ABSTRACT Enterprise information security encompasses
More informationРешения HP по информационной безопасности
Решения HP по информационной безопасности Евгений Нечитайло ynechyta@hp.com Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject
More informationSecurity Testing of Java web applications Using Static Bytecode Analysis of Deployed Applications
Security Testing of Java web applications Using Static Bytecode Analysis of Deployed Applications Streamline your web application Security testing with IBM Security AppScan Source 9.0.1 Leyla Aravopoulos
More informationHP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
More informationHP Yazılım Zirvesi - İstanbul 20 May 2015 - Wyndham Grand Levent Burak DAYIOĞLU, Hüseyin ÖZEL Uygulamalarım Ne Kadar Güvende?
HP Yazılım Zirvesi - İstanbul 20 May 2015 - Wyndham Grand Levent Burak DAYIOĞLU, Hüseyin ÖZEL Uygulamalarım Ne Kadar Güvende? Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained
More informationSeamless integration Connect our solution to your business applications thanks to our open architecture
t b Product data management Manage Product Breakdown Structure and their configurations Process and change management Track and organize changes on your parts, products and documents Seamless integration
More informationelearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
More informationThe Evolution of Application Monitoring
The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments
More informationCertified Selenium Professional VS-1083
Certified Selenium Professional VS-1083 Certified Selenium Professional Certified Selenium Professional Certification Code VS-1083 Vskills certification for Selenium Professional assesses the candidate
More informationImproving your Secure SDLC ( SSDLC ) with Prevoty. How adding real-time application security dramatically decreases vulnerabilities
Improving your Secure SDLC ( SSDLC ) with Prevoty How adding real-time application security dramatically decreases vulnerabilities February 2015 Improving your Secure SDLC ( SSDLC ) with Prevoty Table
More informationSecurity Training-as-a-Service (STr-aaS) Service Details & Features
Security Training-as-a-Service (STr-aaS) Service Details & Features Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware
More informationIBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
More informationNOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES
NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES COMPREHENSIVE VISIBILITY INTO END USER EXPERIENCE MONITORING REQUIRES
More informationPARTNER TRAINING AND CERTIFICATION
PARTNER TRAINING AND CERTIFICATION Partners who place a high degree of importance on proper technical education and training significantly outperform partners who don t. OVERVIEW The Workfront Partner
More informationAutomatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy ari.kesaniemi@nixu.com Copyright The Foundation Permission is granted to copy, distribute and/or modify this
More informationApplication Security Testing
Tstsec - Version: 1 09 July 2016 Application Security Testing Application Security Testing Tstsec - Version: 1 4 days Course Description: We are living in a world of data and communication, in which the
More informationAndrej Zdravkovic Regional Vice President, Platform Solutions Intellinet
Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.
More informationNOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES
NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES COMPREHENSIVE VISIBILITY INTO END USER EXPERIENCE MONITORING REQUIRES
More informationEclipse-based Applications: Java on the Desktop Revisited
Eclipse-based Applications: Java on the Desktop Revisited EclipseCon - Rich Client Platform Track Tuesday, February 3 rd, 3:45pm-4:30pm Todd Williams, Genuitec LLC Paul May, AlterPoint Inc Giovanni Farris,
More informationSelling HP Fortify Solutions
Selling HP Fortify Solutions FOR HP CHANNEL PARTNERS 2 Sales plays 6 14 15 traps Sales Playbook There has never been a better time to sell HP s security solutions. Trends in Big Data, cloud, and mobile
More informationApplication Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
More informationTEAM Academy Catalog. 187 Ballardvale Street, Wilmington, MA 01887 +1.978.694.1008 www.securityinnovation.com
TEAM Academy Catalog 187 Ballardvale Street, Wilmington, MA 01887 +1.978.694.1008 TEAM ACADEMY OVERVIEW 2 Table of Contents TEAM Academy Overview... 4 TEAM Professor Overview... 4 Security Awareness and
More informationBuilding on these core skills, customers can work on advanced concepts, such as:
OpenStack Training OVERVIEW OnX s OpenStack training courses provide a deep and practical understanding of all aspects of today s most popular cloud platform. Unlike other training providers, OnX offerings
More informationServiceNow Authorized Training Partner. Program Guide
ServiceNow Authorized Training Partner Program Guide ServiceNow Authorized Training Partner Program Guide Table of Contents Introduction... 3 Section I: ATP Program... 3 Program Overview... 3 Partner Candidate
More informationAdobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
More informationSecurity Operation Centre 5th generation
Security Operation Centre 5th generation transition Cezary Prokopowicz Regional Manager SEE HP Enterprise Security Products 2 3 4 5 Challenges you are facing 1 Nature and motivation of attacks (Fame to
More informationHP Data Protector 9.x Essentials - Training Agenda
HP Data Protector 9.x Essentials - Training Agenda Course Outline This course is an introduction to HPDP (HP Data Protector). Attendees will learn the bene ts of leveraging HPDP and how to install, con
More informationSecurity Innovation Application Security Education Curriculum. Courses to Help Build and Deploy more Secure Software and Information Systems
Security Innovation Application Security Education Curriculum Courses to Help Build and Deploy more Secure Software and Information Systems Table of Contents 1.0 Security Education Curriculum Map... 3
More informationCourse Design Document: IS429: Cloud Computing and SaaS Solutions. Version 1.0
Course Design Document: IS429: Cloud Computing and SaaS Solutions Version 1.0 08 October 2010 Table of Content Versions History... 4 Overview of the Cloud Computing and SaaS Solutions Course... 5 Synopsis...5
More informationContinuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
???? 1 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Application Delivery is Accelerating Surge in # of releases per app
More informationReinventing Virtual Learning: Delivering Hands-On Training using Cloud Computing
Reinventing Virtual Learning: Delivering Hands-On Training using Cloud Computing WHITE PAPER BROUGHT TO YOU BY SKYTAP 2 Reinventing Virtual Learning: Delivering Hands-On Training using Cloud Computing
More informationHTML5 SECURITY. Why Should I Care? Ofer Shezaf, ofr@hp.com Product Manager, Security Solutions HP ArcSight
HTML5 SECURITY Why Should I Care? Ofer Shezaf, ofr@hp.com Product Manager, Security Solutions HP ArcSight 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change
More informationDocDokuPLM Innovative PLM solution
PLM DocDokuPLM Innovative PLM solution DocDokuPLM: a business solution Manage the entire lifecycle of your products from ideas to market and setup your information backbone. DocDokuPLM highlights Anywhere
More informationSage CRM What s New with Sage CRM 7.2 - Standalone. Sage CRM What s New with Sage CRM 7.2 -Standalone
Sage CRM What s New with Sage CRM 7.2 - Standalone Sage CRM What s New with Sage CRM 7.2 -Standalone Agenda 7.2 On Premise Release EndUser Features Other Features Technology Changes Integrations Roadmap
More informationIntegrating Application Security into the Mobile Software Development Lifecycle. WhiteHat Security Paper
Integrating Application Security into the Mobile Software Development Lifecycle WhiteHat Security Paper Keeping pace with the growth of mobile According to the November 2015 edition of the Ericsson Mobility
More informationBuilding Assurance Into Software Development Life- Cycle (SDLC)
Application Software Assurance Center of Excellence (ASACoE) Building Assurance Into Software Development Life- Cycle (SDLC) James Woody Woodworth Operations Chief, ASACoE & Sean Barnum, Principal Consultant
More informationOVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
More informationCTX-4100BI Citrix Presentation Server 4.5 and XenApp 5.0 for Windows Server 2003: Skills Update
CTX-4100BI Citrix Presentation Server 4.5 and XenApp 5.0 for Windows Server 2003: Skills Update Designed for experienced XenApp users, this course provides the foundation necessary to effectively deploy
More informationStreamlining Application Vulnerability Management: Communication Between Development and Security Teams
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams October 13, 2012 OWASP Boston Application Security Conference Agenda Introduction / Background Vulnerabilities
More informationStories From the Front Lines: Deploying an Enterprise Code Scanning Program
Stories From the Front Lines: Deploying an Enterprise Code Scanning Program Adam Bixby Manager Gotham Digital Science 10/28/2010 YOUR LOGO HERE Introduction Adam Bixby, CISSP, MS o Manager at Gotham Digital
More informationProtect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute
More informationSAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
More informationCLOUD COMPUTING & WINDOWS AZURE
CLOUD COMPUTING & WINDOWS AZURE WORKSHOP Overview This workshop is an introduction to cloud computing and specifically Microsoft s public cloud offering in Windows Azure. Windows Azure has been described
More informationBrandman University. School of CCNA
Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators
More informationTHE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE
THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE How application threat intelligence can make existing enterprise security infrastructures smarter THE BLIND SPOT IN THREAT INTELLIGENCE
More information1000 Projects later. Security Code Scans at SAP
1000 Projects later Security Code Scans at SAP About Us Ruediger Bachmann is a Development Architect at SAP AG working, as member of the central code analyses team, in the areas application security and
More informationImplementing and Administering an Enterprise SharePoint Environment
Implementing and Administering an Enterprise SharePoint Environment There are numerous planning and management issues that your team needs to address when deploying SharePoint. This process can be simplified
More informationDigital Marketplace - G-Cloud
Digital Marketplace - G-Cloud CRM Services Core offer 9 services in this area: 1. Dynamics CRM Upgrade Services Utilising this service, Core will undertake an evaluation of your current CRM platform. We
More informationHP WebInspect Tutorial
HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the
More informationAdvanced Administration for Citrix NetScaler 9.0 Platinum Edition
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced
More informationMicroStrategy Course Catalog
MicroStrategy Course Catalog 1 microstrategy.com/education 3 MicroStrategy course matrix 4 MicroStrategy 9 8 MicroStrategy 10 table of contents MicroStrategy course matrix MICROSTRATEGY 9 MICROSTRATEGY
More informationFedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
More informationCourse Prerequisites and System Requirements. ICCE - Part 1, ICCE - Part 2, and ICCS Prerequisites
Education Services Course Prerequisites and System Requirements ICCE - Part 1, ICCE - Part 2, and ICCS Prerequisites Interactive Intelligence, Inc. (Interactive) training is available to Resellers, Partners,
More informationMCITP: Enterprise Messaging Administrator 2010 Boot Camp
MCITP: Enterprise Messaging Administrator 2010 Boot Camp Validate your Exchange Server skills with the MCITP: Enterprise Messaging Administrator certification. In an intensive and immersive hands-on learning
More informationDeveloping ASP.NET MVC 4 Web Applications
Course M20486 5 Day(s) 30:00 Hours Developing ASP.NET MVC 4 Web Applications Introduction In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools
More informationLR120 LoadRunner 12.0 Essentials
LR120 LoadRunner 12.0 Essentials Overview This five-day course introduces students to HP LoadRunner 12.0, including the usage of Virtual User Generator (VuGen), Controller and Analysis tools. This course
More informationProof of Concept service. Professional and Managed Services. Installation services. First Looks
SUPPORT SERVICES Professional and Managed Services Exclusive Networks offers an extensive professional and managed services portfolio, which enables our business partners to successfully expand their product
More informationStrategic Information Security. Attacking and Defending Web Services
Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP dgreen@securityps.com Introduction About Security PS Application Security Assessments
More informationWebGoat for testing your Application Security tools
WebGoat for testing your Application Security tools NAISG-DFW February 28 th, 2012 Michael A Ortega, CISSP CEH CISM GCFA Sr Application Security Professional IBM Security Systems 312.523.1538 maortega@us.ibm.com
More informationVA SOFTWARE ASSURANCE PROGRAM OFFICE
VA Code Review Process elearning Module Start >> VA Code Review Process elearning Module Getting Started About Fortify About VA This section provides an introduction to this elearning course. This section
More informationCustomer Site Requirements for incontact Workforce Optimization 16.2. www.incontact.com
Customer Site Requirements for incontact Workforce Optimization 16.2 www.incontact.com Customer Site Requirements for incontact Workforce Optimization Version 16.2 Last Revision June 2016 About incontact
More informationBRINGING CLOUD TRADITIONAL DESKTOP COMPUTING TO APPLICATIONS
BRINGING CLOUD COMPUTING TO TRADITIONAL DESKTOP APPLICATIONS Overview Our client, a fast growing startup in the Silicon Valley, has built a scalable web based collaboration platform to help businesses
More informationCore Solutions of Microsoft Exchange Server 2013
EXCHANGE 2013 COURSE OUTLINE Visit Our Website to Enroll Now Www.ITBigBang.Com/IT-Training Core Solutions of Microsoft Exchange Server 2013 Course Title Core Solutions of Microsoft Exchange Server 2013
More informationSAP Crystal Reports & SAP HANA: Integration & Roadmap Kenneth Li SAP SESSION CODE: 0401
SAP Crystal Reports & SAP HANA: Integration & Roadmap Kenneth Li SAP SESSION CODE: 0401 LEARNING POINTS Learn about Crystal Reports for HANA Glance at the road map for the product Overview of deploying
More informationMcAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
More informationInterconnecting Cisco Networking Devices, Part 2 **Part of CCNA Route/Switch**
Course: Interconnecting Cisco Networking Devices, Part 2 Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,295.00 Learning Credits: 33 Certification: CCNA Route/Switch Description: The Interconnecting
More informationPassing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
More informationAdobe Experience Manager: Commerce
Adobe Experience Manager: Commerce Datasheet Adobe Experience Manager: Commerce Benefits of e-commerce capabilities Agile merchandising and marketing Rapid and flexible customization of the shopping experience
More informationA white paper analysis from Orasi Software. Enterprise Security. Attacking the problems of application and mobile security
A white paper analysis from Orasi Software Enterprise Security Attacking the problems of application and mobile security Introduction: Securing the Mobile Enterprise The mobile enterprise has created vast
More information