Analyst Application Security
This qualification is aimed at improving the hands-on capability and efficiency of all cyber security professionals.
45+ hours Class room training
30 hours Theory Sessions
15 hours Practicals
Application Security Monitoring and Mitigation
Working Professional with Experience, Entry Level Working Professional, Graduates student.
Learning Objectives
- An application performance monitoring tool not only ensures that your applications are performing as expected, or responding quickly, but also performing consistently.
- Your users can access your applications at any time of the day.
- Ensuring a consistent experience is critical in maintaining a positive user experience.
- Consistent performance and understanding the stability of your underlying systems allows you to predict how they will perform with varying levels of traffic or activity.
- Security Analyst
- Security Engineer
- Security Architect
- Security Administrator
- Security Researcher
- Pen Tester
- Information Security Auditor
- Jr Threat Hunter
- Security Testing
Kali Linux
Burp Suite
Vega
Metasploit - Identity & Access Management
AWS Cloud
Azure Cloud - Incident Management
Veritas - Security Operation Center
IBM QRadar
Application Security Vulnerability Assessments
Prerequisites
-
- Network & Systems Administration
- Log analysis tools
- IT security architecture
- Network security architecture
- APM tools
Learning Objectives
-
- An application performance monitoring tool not only ensures that your applications are performing as expected, or responding quickly, but also performing consistently.
- Your users can access your applications at any time of the day.
- Ensuring a consistent experience is critical in maintaining a positive user experience.
- Consistent performance and understanding the stability of your underlying systems allows you to predict how they will perform with varying levels of traffic or activity.
- Security Analyst
- Security Engineer
- Security Architect
- Security Administrator
- Security Researcher
- Pen Tester
- Information Security Auditor
- Jr Threat Hunter
- Security Testing
Kali Linux
Burp Suite
Vega
Metasploit - Identity & Access Management
AWS Cloud
Azure Cloud - Incident Management
Veritas - Security Operation Center
IBM QRadar
Application Security Hardening and Deployment Configuration
Prerequisites
- Network & Systems Administration
- Security checklist
- IT security architecture
- Network security architecture
- Hardening tools
Learning Objectives
-
- Provides best practices for securely deploying applications.
- Protect the application from a hacker trying to reverse engineer the app back to source code
- Prevent hackers from trying to inspect internal values, monitor or tamper with the app
- Enable your application to safely run in zero‑trust environments
- Protect your users’ data and sensitive information
- Helps protect the confidentiality, integrity, and availability of your application in production.
- Identifies when each task should be performed: at or near the beginning of development, on an ongoing basis, or just before deployment.
- Helps avoid expensive rework late in your development process.
- Security Analyst
- Security Engineer
- Security Architect
- Security Administrator
- Security Researcher
- Pen Tester
- Information Security Auditor
- Jr Threat Hunter
- Security Testing
Kali Linux
Burp Suite
Vega
Metasploit - Identity & Access Management
AWS Cloud
Azure Cloud - Incident Management
Veritas - Security Operation Center
IBM QRadar