Celebrating the incredible
success of Machine Learning
& Blockchain Trainings
at CUET (BANGLADESH) In collaboration
with Bangladesh Hi Tech Park Authority (BHTPA)
Celebrating the incredible
success of Machine Learning
& Blockchain Trainings
at CUTE (BANGLADESH) In collaboration
with Bangladesh Hi Tech Park Authority (BHTPA)
Date:Thursday & Friday Auguest 29,30 2019
Time:10:00 a.m 12:00 pm
Location:The Statesman House Barakhamba road,New Delhi
Limited seating is available,registration required
if you have questions,Please call at +91 000000000Today, attacks on applications is the preferred ingress vector of all attackers, and application security is the most crucial component of cybersecurity. While most cybersecurity professionals apply standard Appsec controls (sast, dast, access control et al), applications continue to be breached. This is because the standard controls do not adequately address the deepest and most fundamental vulnerability in applications - insecure coding by the application developers. No amount of application security controls would be successful if the very coding of the application is insecure - holes will always remain for attackers to exploit. CISO academy addresses this gap with courses that can be used by application developers, as well as cybersecurity professionals, to understand attacks at the code level of the most commonly used languages.
Python
The course introduces the need and importance of secure coding, It dives into the specific attacks and vulnerabilities that one of the most popular programming languages, Python, suffers from and also lists the vulnerabilities present in popular python frameworks like Django and Flask.
Node JS
The course will help developers and programmers understand the concept and importance of application security and secure coding while explaining the attacks and vulnerabilities on the Node JS modules and libraries. They will also learn about the remediation techniques to help mitigate all the attacks and vulnerabilities discussed throughout the course.
Angular
This course on DevSecOps reiterates the need and importance of secure coding through detailed explanations and practical demonstrations on the various attacks and vulnerabilities that affect Angular JS - one of the most popular Javascript-based front end libraries.
JavaScript
The course highlights the present situation in the field of application security and details the need for secure coding. It dives into the specific attacks and vulnerabilities, that Javascript related libraries suffer from. The course not only includes an in-depth analysis of the attacks through demonstration but also accompanies them with secure coding best practices and guidelines appropriate for the language.
Swift
The course introduces the need and importance of secure coding in iOS swift. It dives into specific code attacks and vulnerabilities seen in applications that are run on one of the most secure devices - iPhone and MAC. The course also walks the participants through various best practices that should be followed to counter the attacks and vulnerabilities, complimented with actual code examples for a better and sound understanding.
Objective C
The course starts by introducing the need for secure coding and moves to various attacks and vulnerabilities that Objective C suffers from. Attacks are well complimented with coding examples, which can be copied by participants to replicate the attacks for a hands-on experience. As Objective C allows for pointers and its functions are accessible through swift, so it becomes important to understand how Objective C is attacked, to be able to better protect both Swift and Objective C modules.
Android
Since the inception of Android, more than 2000 vulnerabilities have been reported across multiple forums, vulnerability databases and community pages. This opens a plethora of options for attackers to attack android apps and steal sensitive data. The course starts by talking about the present situation of security in Android, with detailed discussion around attacks and vulnerabilities, rouge app stores, third party app problems, integrations, API and database security issues. Lastly, advancing towards various best practices, remediation and solutions that can make android apps more secure.
Java
The need to know secure coding practices in java is imperative, as java is one of the most widely used languages in any production level system. For simplicity, the course is divided into 3 phases, starting with various vulnerabilities and attacks that can target java, java frameworks and java libraries. In phase 2, the course explains about the various ways to remediate attacks and vulnerabilities, while lastly, moving to discuss about the best practices that should be followed to avoid compromise of code and information.
The quantity as well as complexity of malicious programs has risen exponentially over the last few decades. To keep up, automation and machine-driven analysis is not only critical but the only possible way forward. Machine learning and deep learning enables us to use the powerful biology inspired realms of AI and power some of the most effective methods for analysing advanced threats and model user behaviors without human intervention.
Attend this workshop and learn from security and AI experts for Interset:
Swift
The course introduces the need and importance of secure coding in iOS swift. It dives into specific code attacks and vulnerabilities seen in applications that are run on one of the most secure devices - iPhone and MAC. The course also walks the participants through various best practices that should be followed to counter the attacks and vulnerabilities, complimented with actual code examples for a better and sound understanding.
Objective C
The course starts by introducing the need for secure coding and moves to various attacks and vulnerabilities that Objective C suffers from. Attacks are well complimented with coding examples, which can be copied by participants to replicate the attacks for a hands-on experience. As Objective C allows for pointers and its functions are accessible through swift, so it becomes important to understand how Objective C is attacked, to be able to better protect both Swift and Objective C modules.
Android
Since the inception of Android, more than 2000 vulnerabilities have been reported across multiple forums, vulnerability databases and community pages. This opens a plethora of options for attackers to attack android apps and steal sensitive data. The course starts by talking about the present situation of security in Android, with detailed discussion around attacks and vulnerabilities, rouge app stores, third party app problems, integrations, API and database security issues. Lastly, advancing towards various best practices, remediation and solutions that can make android apps more secure.
Java
The need to know secure coding practices in java is imperative, as java is one of the most widely used languages in any production level system. For simplicity, the course is divided into 3 phases, starting with various vulnerabilities and attacks that can target java, java frameworks and java libraries. In phase 2, the course explains about the various ways to remediate attacks and vulnerabilities, while lastly, moving to discuss about the best practices that should be followed to avoid compromise of code and information.
As cyber attackers are becoming more sophisticated and ever more destructive, we need to add an extra layer of defense - Active Cyber Defense to existing security operations. Active Defense practices uses the approaches like Fortification and Threat Hunting, which if used with other rigorous techniques like Machine Learning and Artificial Intelligence, can provide the organization with the capability to identify and eradicate latent attackers that circumvent traditional security monitoring and target intellectual properties and business systems.
The present day attacks have become extraordinarily sophisticated, as attackers simulate near real life employee behavior for accessing company resources while remaining notorious in their intentions. So, its time we understand how we can move to systems which transform traditional IAM policies into a more dynamic, agile and risk aware systems. The session would cover the need for a new and adaptive IAM strategy that would help the existing businesses to adjust security policies on the fly.
As the threat landscape has been constantly changing, the intelligence to foresee and strategically prepare for incoming attacks has become a vital necessity. The session will give participants an all-round vision of how evidence based as well as derived knowledge can help organizations take informed decisions and prepare for potential attacks before they strikes them.
"Something that can't be measured, can not be corrected". To better understand the network weaknesses it is important to identify assets and crown jewels that need to be protected, define possible ways of attacks (think like the attacker) and come up with countermeasures to mitigate the identified loop holes. The session would help participants understand how to streamline the process of identifying threats, creating strategies which involve business processes, employees and organization infrastructure.
As cyber attackers are becoming more sophisticated and ever more destructive, we need to add an extra layer of defense - Active Cyber Defense to existing security operations. Active Defense practices uses the approaches like Fortification and Threat Hunting, which if used with other rigorous techniques like Machine Learning and Artificial Intelligence, can provide the organization with the capability to identify and eradicate latent attackers that circumvent traditional security monitoring and target intellectual properties and business systems.
Awards
Received award for skilling, 2018 from Anant Kumar Hegde (Union Minister of State for Skill Development and Entrepreneurship) in Government's Skilling India initiative
OUR CUSTOMERS
Contact Us
+91-7011526166
+91-7011599389
contact@cisoacademy.com
Gurgaon Office
A29/6, DLF Phase 1,
Gurgaon, Haryana 122022
Delhi Office
The Statesman House
148 Barakhamba Road,
New Delhi