Skip to main content

Security courses @CyResLab - October/November 2022

As part of the activities dedicated to the European Cyber Security Month (ESCM), CyResLab @ ESI CEE is excited to announce five security courses in October and November 2022. The courses are designed for SME software developers, designers, application and system engineers. This is the technical layer of the general lines of ESI CEE in the field of Security by Design, Cyber Resilience, Privacy by Default and Secure Coding.

 

Advanced Web Threats for Developers and QA Specialists (27-28 Oct)

When: 27-28-Oct-2022 10:00 AM

 

In this advanced course, CyResLab has additionally included exercises in which participants in turn attempt to fix and attack particular implementations. A heavier focus is be placed on labs.


The “Advanced Web Threats” course includes free access to an interactive online exercise environment for one week, following the course’s completion.

 

Top 10 Web Threats for Developers (12 Oct)

When: 12-Oct-2022 10:00

 

In this course, CyResLab has included live demos of attacks, exercises in detecting and leveraging threats, examples of weak and vulnerable code and the process of repairing it and fixing vulnerabilities, mitigation tactics, developer-specific best practices and discussions on how not to write vulnerable code in the process of daily work. The course is mostly technical and not organizational.

 

Security courses @CyResLab - October/December 2019

As part of the activities dedicated to the European Cyber Security Month (ESCM), CyResLab @ ESI CEE is excited to announce seven security courses in October, November and December 2019. The courses are targeted to SME’s software developers, designers, application and system engineers. This is the technical layer of the general lines of ESI CEE in the field of Security by Design, Cyber Resilience, Privacy by Default and Secure Coding.

Top 10 Web Threats (29 Nov)

When: 29-Nov-2019 9:00

 

In this course, CyResLab has included live demos of attacks, exercises in detecting and leveraging threats, examples of weak and vulnerable code and the process of repairing it and fixing vulnerabilities, mitigation tactics, developer-specific best practices and discussions on how not to write vulnerable code in the process of daily work. The course is mostly technical and not organizational.