HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training
|
|
|
- Jerome Price
- 10 years ago
- Views:
Transcription
1 HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training HP and HP Enterprise Security Products are committed to your success as an HP Partner. In the Fortify Proof of Concept Boot Camp Training, our ESP partner presales and architecture team members can build the skills that will equip them to represent and position HP Fortify solutions and effectively deliver Fortify solution proof of concept engagements. Participants in the Boot Camp typically are partner resources who engineer solutions for their customers and are capable and experienced in the delivery of demonstrations and proof of concepts. HP Fortify Partner Enablement training allows HP Partners to effectively deliver compelling and effective security solutions for their customers. This two day training course covers technical presales and architecture components of the Fortify portfolio including SAST, DAST, RAST, and FOD via classroom content and real world examples. For more information about HP Fortify portfolio, visit Course Overview This training event consists of distinct sessions, each with its own registration to allow for flexibility in attendance. More information about each session can be found below: Session Day HP ExpertOne Fortify Security Solutions ATP Prep Day The first day of the Fortify Boot camp is focused on Partner s pre-sales and architect team members and provides a single day of intensive preparation for the HP ExpertOne Fortify Security Solutions HP0-A0 ExpertOne ATP examination. Through lectures and hand-on activities the student will validate they have the competencies to implement HP Fortify Static Code Analyzer, Software Security Center, WebInspect and Fortify Runtime After completing this course, the student should be able to determine if they are sufficiently skilled to sit the HP0-A0 ExpertOne Examination. Attendees of this day will receive a voucher to take the HP0-A0 Fortify Security Solutions ATP ExpertOne examination. Session Day - HP Fortify Proof of Concept Boot Camp The next three days are the Fortify Proof of Concept boot camp focused on Partner s pre-sales and architect team members. On the first day we will lay down the foundations of addressing strategic and winning proposals for HP Fortify where a Proof of Concept is requested or required. Using two PoC examples as the basis, we will exercise all necessary activities which drive a PoC that has an optimum result PoC including: Guidance to conduct PoC with HP Fortify Solution Products Give attendees a base understanding of HP Fortify product suite and the goals of a Proof of Value/Concept with HP Fortify solution products versus a demo. Outlining the PoV concept - Prerequisites and things to know before a PoV Dramatization of Value / Benefits (demonstration of common use cases / work flows tailored to Prospect circumstances) Understanding the Technical considerations - What's essential to successfully conduct a PoV HP Fortify SCA and HP WebInspect specifics
2 On the second day, of the Boot Camp we will build additional product awareness through POC practice including HP Fortify: Hands-on with configuration and use cases Ability to Troubleshoot Common Problems HP WebInspect: Hands-on with configuration and use cases Introduction to RASP - Application Defender Fortify on Demand PoC & On-boarding Presenting the results - What's good to show to customers The third day of the Boot Camp addresses advanced POC topics including: Advanced Auditing Best Practice Intro to Custom Rules - when to use and when not to Basic scan debugging and troubleshooting Basic security remediation Intro to custom rules Deep dive with various common languages FoD Deep-dive Static and Dynamic Analysis Objection handling Session Day HP Fortify Day with Product Management The last day of the Fortify boot camp is the Fortify Day with Product Management and is focused on a partner s Sales and Pre Sales team members. Attendees are presented with the Fortify Solution Products portfolio and will learn how HP Fortify fits in the bigger HP Enterprise Security Products (ESP) picture and how to deliver the right messages about Fortify to potential customers. By attending the session the attendees will learn about customers use cases and key selling points when facing customers with Application Security requirements. In addition, Fortify Product Managers will introduce new solution products as well as packaging and licensing. Pre requisites Day ATP Prep Day: months HP Fortify experience, or completion of Fortify Security Solutions - ATP course - Day - PoC Boot Camp is technical in nature, frequently addressing complex topics and materials. It is expected that attendees: Are familiar with the processes for SDLC. Are familiar with the Fortify solution set and general scope Have a good understanding of software risks, including what are XSS, SQLi, forceful browsing, invalidated inputs, Buffer Overflows/Overruns. (See OWASP site) SAST: Understanding of programming processes and toolsets including the use of IDE and Build servers. Basic working knowledge of the Fortify SAST products, particularly SCA (multiple OS) and SSC Server (multiple OS, Java app) DAST: Basic working knowledge of the Fortify DAST products, particularly WebInspect (desktop). Understanding of vulnerability scanning techniques including Crawling (Discovery) and Auditing (Attacks) as well as Manual methods. Working knowledge on networks and their general operation, including proxies, intercept proxy tools, and the uses and effects of IPS/IDS RAST: Basic working knowledge of the Fortify RAST products, particularly Runtime (RTAL/RTAP) Day Day with Product Management session requires some knowledge and some experience with Application Security technologies. Sales and Pre Sales should record skills in understanding customer requirements considering security monitoring and cyber defense. Technical Requirements What Attendees Need to Bring Most training content is delivered as slides, hand outs and white boarding. For hands on labs, please bring a lap top computer. We will have an installation of Fortify software for you to use during the session. Use of a tablet in these sessions is not recommended unless you have keyboard and mouse. Web browser requirements:
3 Chrome + Firefox + Safari HTML Important: Your HP Learner ID Along with your name and address, your HP Learning Center Learner ID will be used to register and track your attendance and recognize your partner organization for your training. If you do not have a HP Learner ID, please visit the HP Learner ID for Partners page to request your learner ID at: esstolc-upp-gpp.pdf A quick reference card with the steps to obtain the learner ID can also be found via a link at the bottom of that page. Please note that it can take up to three days for this to be processed, so start this activity early.
4 Course Modules Overview Below is a short overview of the modules covered during the different Boot Camp sessions. Breaks are organized every 90mn and lunch will be in the middle of the day. DAY---- Fortify Security Solutions ATP Prep Day Welcome Introduction Session presentation and objectives HP ESP & Fortify Overview Overview of HP ESP, the current state of Software Security, and the entire Fortify product suite static, dynamic, and run-time protection and purpose of each Common Software Development Application Security Methodologies OWASP Top 0 FSIMM OpenSAMM Microsoft SDL Implementation of Fortify Products Architecture of the Fortify Solution Software Security Center (SSC) Static Code Analyser (SCA) WebInspect Enterprise (WIE) Application Defender Software Security Threat Agents Insider threats vs. Outsider threats Day Fortify PoC Boot camp Session Introduction and goals An introduction to the team, discuss expectations and set goals HP ESP & Fortify Overview Overview of HP ESP, the current state of Software Security, and the entire Fortify product suite static, dynamic, and run-time protection and purpose of each Outlining HP Fortify Proof of Value/Concept This module will focus on the POC aspect from a business, sales, and troubleshooting perspective. PoC Best Practices & Common Mistakes & Software Security Assurance Deeper dive into the overall components of a POC and SSA process to include troubleshooting tactics, common mistakes made, and recommendations for success. Operational Proficiency: Issue Triage & Lab This is a hands-on Static Analysis module series. In this session, individuals will learn how to use Fortify SCA, Audit Workbench, Command-line Utility, and Software Security Center. During this module, the installation of the demonstration environment will take place and static analysis will be performed on sample source code to assess, triage, and promote vulnerability findings within the SDLC. SCA, SSC, AWB, IDE POC & Workflows 7 8 Operational Proficiency: Project configuration This module extends the Issue Triage & Lab session. This is a hands-on learning session on how to manage and maintain vulnerability findings through custom filters, folders, and tags. Operational Proficiency: Collaboration This module extends the Issue Triage & Lab session. This is a hands-on learning session on how to leverage SSC Governance and integrate with the IDE plugin. Day Fortify POC Boot camp Intro to Dynamic & Integrated Analysis - WebInspect Overview of HP WebInspect Standalone, Real-Time, and Enterprise versions and purpose of each Operational Proficiency: Blackbox & Ops A deep dive module on Dynamic Analysis security testing to address security concerns in web sites, web services, and mobile application components. This module is feature rich and will cover the most important aspects to help you deliver meaningful results to prospects and customers.
5 Intro to SaaS - FoD & Application Defender SaaS is a major differentiator for HP Fortify. This module series is a hands-on deep dive into Fortify on Demand and Application Defender. Operational Proficiency: RASP This module will involve the installation, verification, and configuration of Application Defender. This is a deep-dive hands-on session to introduce the newest Gartner Magic Quadrant category Real-time Application Self-Protection. Operational Proficiency: SaaS This module will go into the details of Static, Dynamic, and Mobile Application Testing methodologies in the Cloud. This module will cover the differences and similarities of an on premise vs. in-the-cloud solution. Back-office operations and complexity and scale of the overall solution will also be discussed. Intro to Advanced Auditing Best Practices Practical Custom Rules Day Fortify POC Boot camp Deep Dive with.net & Java Deep Dive with C & C++ Deep Dive with Objective-C, Ruby & Others Fortify on Demand Deep Dive Build Integration Bug-tracker Integration Integration with FoD on Premise Data export to GRC or other management information systems FoD API Playbook Overview Day Day with Product Management Fortify Security Strategy Fortify Architecture and Design How to Sell the Fortify Product suite Facing our competitors Competitive update Product Roadmap and Updates SCA/SSC/tools WI/WIE Runtime products FoD/SaaS upgrades and migrations, obsolescence 7 Marketing campaigns, SPIFFs, programs Learn more at arrowecs.de
Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company
Product Roadmap Sushant Rao Principal Product Manager Fortify Software, a HP company Agenda Next Generation of Security Analysis Future Directions 2 Currently under investigation and not guaranteed to
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security The problem Cyber attackers are targeting applications
Is your software secure?
Is your software secure? HP Fortify Application Security VII konferencja Secure 2013 Warsaw - October 9, 2013 Gunner Winkenwerder Sales Manager Fortify CEE, Russia & CIS HP Enterprise Security +49 (172)
Fortify Training Services. Securing Your Entire Software Portfolio FRAMEWORK*SSA
Fortify Training Services Securing Your Entire Software Portfolio FRAMEWORK*SSA Fortify s holistic approach to application security truly safeguards our enterprise against today s ever-changing security
HP Fortify application security
HP Fortify application security Erik Costlow Enterprise Security The problem Cyber attackers are targeting applications Networks Hardware Applications Intellectual Property Security Measures Switch/Router
From the Bottom to the Top: The Evolution of Application Monitoring
From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:
IoT Potential Risks and Challenges
IoT Potential Risks and Challenges GRIFES / GITI / EPFL Alumni Conference, Lausanne, May 7 th, 2015 Stefan Schiller, HP ESP Fortify Solution Architect D/A/CH IoT Potential Risks and Challenges Agenda IDC
HP Fortify Software Security Center
HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)
Application Security Testing How to find software vulnerabilities before you ship or procure code
Application Security Testing How to find software vulnerabilities before you ship or procure code Anita D Amico, Ph.D. Hassan Radwan 1 Overview Why Care About Application Security? Quality vs Security
Cloud & Datacenter Monitoring with System Center Operations Manager
Page 1 of 5 Overview This course equips students with the skills they require to deploy and configure System Center 2012 R2 Operations. Using hands-on labs, students learn the following: How to architect
Partner Enablement Training PRESENTED BY: TABLEAU PARTNER TEAM
Partner Enablement Training PRESENTED BY: TABLEAU PARTNER TEAM Welcome On behalf of Tableau s Global Channel, we welcome you to Tableau s Partner Enablement Training! It is because of you that this program
Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE. Jimmie Parson Checkpoint Technologies
Testing Solutions to Tackle Application Security Checkpoint Technologies SQGNE Jimmie Parson Checkpoint Technologies Welcome, Introductions Agenda Checkpoint Technologies Quick Corporate Overview Why do
Security Tools - Hands On
Security Tools - Hands On SecAppDev 2014 Ken van Wyk, @KRvW! Leuven, Belgium 10-14 February 2014 Caveats and Warnings This is not a sales pitch for any product(s) If you want to talk to a sales person,
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY How runtime application security monitoring helps enterprises make smarter decisions on remediation 2 ABSTRACT Enterprises today
Bringing Security Testing to Development. How to Enable Developers to Act as Security Experts
Bringing Security Testing to Development How to Enable Developers to Act as Security Experts Background: SAP SE SAP SE Business Software Vendor Over 68000 employees Worldwide development Myself Security
Application Security Center overview
Application Security overview Magnus Hillgren Presales HP Software Sweden Fredrik Möller Nordic Manager - Fortify Software HP BTO (Business Technology Optimization) Business outcomes STRATEGY Project &
Security-as-a-Service (Sec-aaS) Framework. Service Introduction
Security-as-a-Service (Sec-aaS) Framework Service Introduction Need of Information Security Program In current high-tech environment, we are getting more dependent on information systems. This dependency
The Evolution of Enterprise Application Security. Why enterprises need runtime application self-protection
The Evolution of Enterprise Application Security Why enterprises need runtime application self-protection 2 Abstract Enterprise information security encompasses a broad set of disciplines and technologies,
What s New in HP Fortify Software Security Center 4.20
What s New in HP Fortify Software Security Center 4.20 September 2014 This release of HP Fortify Software Security Center includes the 10.30 release of WebInspect and WebInspect Enterprise. The WebInspect
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
! Resident of Kauai, Hawaii
SECURE SDLC Jim Manico @manicode! OWASP Volunteer! Global OWASP Board Member! Manager of several OWASP secure coding projects! Security Instructor, Author! 17 years of web-based, databasedriven software
What s New in HP Fortify Software Security Center 4.30 and HP WebInspect 10.40 Products
What s New in HP Fortify Software Security Center 4.30 and HP WebInspect 10.40 Products April 2015 This release of HP Fortify Software Security Center includes the 10.40 release of WebInspect and WebInspect
Starting your Software Security Assurance Program. May 21, 2015 ITARC, Stockholm, Sweden
Starting your Software Security Assurance Program May 21, 2015 ITARC, Stockholm, Sweden Presenter Max Poliashenko Chief Enterprise Architect Wolters Kluwer, Tax & Accounting Max leads the Enterprise Architecture
THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY
THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY Why enterprises need runtime application self-protection 2 ABSTRACT Enterprise information security encompasses
Решения HP по информационной безопасности
Решения HP по информационной безопасности Евгений Нечитайло [email protected] Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject
Security Testing of Java web applications Using Static Bytecode Analysis of Deployed Applications
Security Testing of Java web applications Using Static Bytecode Analysis of Deployed Applications Streamline your web application Security testing with IBM Security AppScan Source 9.0.1 Leyla Aravopoulos
HP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
HP Yazılım Zirvesi - İstanbul 20 May 2015 - Wyndham Grand Levent Burak DAYIOĞLU, Hüseyin ÖZEL Uygulamalarım Ne Kadar Güvende?
HP Yazılım Zirvesi - İstanbul 20 May 2015 - Wyndham Grand Levent Burak DAYIOĞLU, Hüseyin ÖZEL Uygulamalarım Ne Kadar Güvende? Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained
Seamless integration Connect our solution to your business applications thanks to our open architecture
t b Product data management Manage Product Breakdown Structure and their configurations Process and change management Track and organize changes on your parts, products and documents Seamless integration
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
The Evolution of Application Monitoring
The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments
Certified Selenium Professional VS-1083
Certified Selenium Professional VS-1083 Certified Selenium Professional Certified Selenium Professional Certification Code VS-1083 Vskills certification for Selenium Professional assesses the candidate
Improving your Secure SDLC ( SSDLC ) with Prevoty. How adding real-time application security dramatically decreases vulnerabilities
Improving your Secure SDLC ( SSDLC ) with Prevoty How adding real-time application security dramatically decreases vulnerabilities February 2015 Improving your Secure SDLC ( SSDLC ) with Prevoty Table
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES
NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES COMPREHENSIVE VISIBILITY INTO END USER EXPERIENCE MONITORING REQUIRES
PARTNER TRAINING AND CERTIFICATION
PARTNER TRAINING AND CERTIFICATION Partners who place a high degree of importance on proper technical education and training significantly outperform partners who don t. OVERVIEW The Workfront Partner
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Application Security Testing
Tstsec - Version: 1 09 July 2016 Application Security Testing Application Security Testing Tstsec - Version: 1 4 days Course Description: We are living in a world of data and communication, in which the
Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet
Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.
NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES
NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES COMPREHENSIVE VISIBILITY INTO END USER EXPERIENCE MONITORING REQUIRES
Eclipse-based Applications: Java on the Desktop Revisited
Eclipse-based Applications: Java on the Desktop Revisited EclipseCon - Rich Client Platform Track Tuesday, February 3 rd, 3:45pm-4:30pm Todd Williams, Genuitec LLC Paul May, AlterPoint Inc Giovanni Farris,
Selling HP Fortify Solutions
Selling HP Fortify Solutions FOR HP CHANNEL PARTNERS 2 Sales plays 6 14 15 traps Sales Playbook There has never been a better time to sell HP s security solutions. Trends in Big Data, cloud, and mobile
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
TEAM Academy Catalog. 187 Ballardvale Street, Wilmington, MA 01887 +1.978.694.1008 www.securityinnovation.com
TEAM Academy Catalog 187 Ballardvale Street, Wilmington, MA 01887 +1.978.694.1008 TEAM ACADEMY OVERVIEW 2 Table of Contents TEAM Academy Overview... 4 TEAM Professor Overview... 4 Security Awareness and
ServiceNow Authorized Training Partner. Program Guide
ServiceNow Authorized Training Partner Program Guide ServiceNow Authorized Training Partner Program Guide Table of Contents Introduction... 3 Section I: ATP Program... 3 Program Overview... 3 Partner Candidate
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Security Operation Centre 5th generation
Security Operation Centre 5th generation transition Cezary Prokopowicz Regional Manager SEE HP Enterprise Security Products 2 3 4 5 Challenges you are facing 1 Nature and motivation of attacks (Fame to
HP Data Protector 9.x Essentials - Training Agenda
HP Data Protector 9.x Essentials - Training Agenda Course Outline This course is an introduction to HPDP (HP Data Protector). Attendees will learn the bene ts of leveraging HPDP and how to install, con
Security Innovation Application Security Education Curriculum. Courses to Help Build and Deploy more Secure Software and Information Systems
Security Innovation Application Security Education Curriculum Courses to Help Build and Deploy more Secure Software and Information Systems Table of Contents 1.0 Security Education Curriculum Map... 3
Course Design Document: IS429: Cloud Computing and SaaS Solutions. Version 1.0
Course Design Document: IS429: Cloud Computing and SaaS Solutions Version 1.0 08 October 2010 Table of Content Versions History... 4 Overview of the Cloud Computing and SaaS Solutions Course... 5 Synopsis...5
Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
???? 1 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Application Delivery is Accelerating Surge in # of releases per app
Reinventing Virtual Learning: Delivering Hands-On Training using Cloud Computing
Reinventing Virtual Learning: Delivering Hands-On Training using Cloud Computing WHITE PAPER BROUGHT TO YOU BY SKYTAP 2 Reinventing Virtual Learning: Delivering Hands-On Training using Cloud Computing
DocDokuPLM Innovative PLM solution
PLM DocDokuPLM Innovative PLM solution DocDokuPLM: a business solution Manage the entire lifecycle of your products from ideas to market and setup your information backbone. DocDokuPLM highlights Anywhere
Sage CRM What s New with Sage CRM 7.2 - Standalone. Sage CRM What s New with Sage CRM 7.2 -Standalone
Sage CRM What s New with Sage CRM 7.2 - Standalone Sage CRM What s New with Sage CRM 7.2 -Standalone Agenda 7.2 On Premise Release EndUser Features Other Features Technology Changes Integrations Roadmap
Integrating Application Security into the Mobile Software Development Lifecycle. WhiteHat Security Paper
Integrating Application Security into the Mobile Software Development Lifecycle WhiteHat Security Paper Keeping pace with the growth of mobile According to the November 2015 edition of the Ericsson Mobility
Building Assurance Into Software Development Life- Cycle (SDLC)
Application Software Assurance Center of Excellence (ASACoE) Building Assurance Into Software Development Life- Cycle (SDLC) James Woody Woodworth Operations Chief, ASACoE & Sean Barnum, Principal Consultant
OVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
CTX-4100BI Citrix Presentation Server 4.5 and XenApp 5.0 for Windows Server 2003: Skills Update
CTX-4100BI Citrix Presentation Server 4.5 and XenApp 5.0 for Windows Server 2003: Skills Update Designed for experienced XenApp users, this course provides the foundation necessary to effectively deploy
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams October 13, 2012 OWASP Boston Application Security Conference Agenda Introduction / Background Vulnerabilities
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
CLOUD COMPUTING & WINDOWS AZURE
CLOUD COMPUTING & WINDOWS AZURE WORKSHOP Overview This workshop is an introduction to cloud computing and specifically Microsoft s public cloud offering in Windows Azure. Windows Azure has been described
Brandman University. School of CCNA
Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators
THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE
THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE How application threat intelligence can make existing enterprise security infrastructures smarter THE BLIND SPOT IN THREAT INTELLIGENCE
1000 Projects later. Security Code Scans at SAP
1000 Projects later Security Code Scans at SAP About Us Ruediger Bachmann is a Development Architect at SAP AG working, as member of the central code analyses team, in the areas application security and
Implementing and Administering an Enterprise SharePoint Environment
Implementing and Administering an Enterprise SharePoint Environment There are numerous planning and management issues that your team needs to address when deploying SharePoint. This process can be simplified
Digital Marketplace - G-Cloud
Digital Marketplace - G-Cloud CRM Services Core offer 9 services in this area: 1. Dynamics CRM Upgrade Services Utilising this service, Core will undertake an evaluation of your current CRM platform. We
HP WebInspect Tutorial
HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced
MicroStrategy Course Catalog
MicroStrategy Course Catalog 1 microstrategy.com/education 3 MicroStrategy course matrix 4 MicroStrategy 9 8 MicroStrategy 10 table of contents MicroStrategy course matrix MICROSTRATEGY 9 MICROSTRATEGY
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
Course Prerequisites and System Requirements. ICCE - Part 1, ICCE - Part 2, and ICCS Prerequisites
Education Services Course Prerequisites and System Requirements ICCE - Part 1, ICCE - Part 2, and ICCS Prerequisites Interactive Intelligence, Inc. (Interactive) training is available to Resellers, Partners,
Developing ASP.NET MVC 4 Web Applications
Course M20486 5 Day(s) 30:00 Hours Developing ASP.NET MVC 4 Web Applications Introduction In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools
LR120 LoadRunner 12.0 Essentials
LR120 LoadRunner 12.0 Essentials Overview This five-day course introduces students to HP LoadRunner 12.0, including the usage of Virtual User Generator (VuGen), Controller and Analysis tools. This course
Proof of Concept service. Professional and Managed Services. Installation services. First Looks
SUPPORT SERVICES Professional and Managed Services Exclusive Networks offers an extensive professional and managed services portfolio, which enables our business partners to successfully expand their product
Strategic Information Security. Attacking and Defending Web Services
Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP [email protected] Introduction About Security PS Application Security Assessments
WebGoat for testing your Application Security tools
WebGoat for testing your Application Security tools NAISG-DFW February 28 th, 2012 Michael A Ortega, CISSP CEH CISM GCFA Sr Application Security Professional IBM Security Systems 312.523.1538 [email protected]
VA SOFTWARE ASSURANCE PROGRAM OFFICE
VA Code Review Process elearning Module Start >> VA Code Review Process elearning Module Getting Started About Fortify About VA This section provides an introduction to this elearning course. This section
Customer Site Requirements for incontact Workforce Optimization 16.2. www.incontact.com
Customer Site Requirements for incontact Workforce Optimization 16.2 www.incontact.com Customer Site Requirements for incontact Workforce Optimization Version 16.2 Last Revision June 2016 About incontact
Core Solutions of Microsoft Exchange Server 2013
EXCHANGE 2013 COURSE OUTLINE Visit Our Website to Enroll Now Www.ITBigBang.Com/IT-Training Core Solutions of Microsoft Exchange Server 2013 Course Title Core Solutions of Microsoft Exchange Server 2013
SAP Crystal Reports & SAP HANA: Integration & Roadmap Kenneth Li SAP SESSION CODE: 0401
SAP Crystal Reports & SAP HANA: Integration & Roadmap Kenneth Li SAP SESSION CODE: 0401 LEARNING POINTS Learn about Crystal Reports for HANA Glance at the road map for the product Overview of deploying
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
Interconnecting Cisco Networking Devices, Part 2 **Part of CCNA Route/Switch**
Course: Interconnecting Cisco Networking Devices, Part 2 Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,295.00 Learning Credits: 33 Certification: CCNA Route/Switch Description: The Interconnecting
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Adobe Experience Manager: Commerce
Adobe Experience Manager: Commerce Datasheet Adobe Experience Manager: Commerce Benefits of e-commerce capabilities Agile merchandising and marketing Rapid and flexible customization of the shopping experience
A white paper analysis from Orasi Software. Enterprise Security. Attacking the problems of application and mobile security
A white paper analysis from Orasi Software Enterprise Security Attacking the problems of application and mobile security Introduction: Securing the Mobile Enterprise The mobile enterprise has created vast
