Our Courses

Network Security & Database Vulnerabilities

Network Security & Database Vulnerabilities

This course gives you the background needed to understand basic network security. You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization. You will learn the network components that guard an organization from cybersecurity attacks.\n\nIn addition to networking, you will learn about database vulnerabilities and the tools/knowledge needed to research a database vulnerability for a variety of databases including SQL Injection, Oracle, Mongo and Couch.

  • Course by
  • Self Paced
  • 15 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
    Buy Now
  • AED 170.99 + VAT
Know more
Software Security

Software Security

This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems.

  • Course by
  • Self Paced
  • 18 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
    Buy Now
  • AED 170.99 + VAT
Know more
Hacking and Patching

Hacking and Patching

In this MOOC, you will learn how to hack web apps with command injection vulnerabilities in a web site of your AWS Linux instance. You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future exploitation. You will learn how to patch these web apps with input validation using regular expression. You will learn a security design pattern to avoid introducing injection vulnerabilities by input validation and replacing generic system calls with specific function calls.

  • Course by
  • Self Paced
  • 15 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Identifying Security Vulnerabilities

Identifying Security Vulnerabilities

This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. We'll learn the basics of applying cryptography, such as encryption and secure hashing. We'll learn how attackers can exploit application vulnerabilities through the improper handling user-controlled data.

  • Course by
  • Self Paced
  • 14 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Parametrize Queries to Protect Against Injections with Java

Parametrize Queries to Protect Against Injections with Java

By the end of this project you will be able to build a simple PostgreSQL database, we will interact with this simple database by creating a simple Java application that will use parameterized queries so as to prevent SQL injection attacks by using various well known methods that are widely used in the industry to protect against SQL injection attacks.

  • Course by
  • Self Paced
  • 3 hours
  • English
Monthly Subscription
Option not available
    Buy Now
  • Free
Know more