Deepen your knowledge in cybersecurity, development, and infrastructure with our dedicated experts. Choose from a wide range of practical exercises with advanced training options, customized tools, and effective methods.
This helps reduce the risk of being affected both by mistakes in development and, for example, vulnerabilities in third-party dependencies. Additionally, a secure coding standard /../Learn more
We use OWASP Juice Shop as a training ground. We’ll discuss mitigations and how you can avoid the vulnerability class when developing using patterns and /../Learn more
This two-day lecture-style course, developed and presented by Simon Binder, Microsoft MVP, is aimed at device administrators that want to learn how to configure and /../Learn more
In this lecture-style class developed and presented by Viktor Hedberg, Senior Consultant at Truesec and Microsoft MVP, alongside Marcus Pettersson, Senior Consultant at Truesec, you’ll /../Learn more
Learn how to take control of your mobile devices and allow your workforce to be productive while ensuring that your corporate data is secure. This /../Learn more
This lab is developed by two experienced Windows Client deployment and management experts, Johan Arwidmark and Peter Löfgren, which makes this lab unique. The systems /../Learn more
To improve your organization’s resilience against social engineering, you must first understand the anatomy of social engineering attacks. This social engineering class is developed by /../Learn more