Redguard AG offers you a wide range of E-Learning courses on various topics to help you expand your employees' knowledge and skills in different aspects of security. From basic security concepts to advanced topics, various modules are available. Our short, 10-15 minute videos make learning easy and convenient.

Our Trainings

Basic Security

Introduction to the basics of security:

  • Secure Development Lifecycle
  • HTTP Transport Security
  • CSRF and Clickjacking
  • Cryptography Basics
  • Brute Force Attacks
  • Denial of Service Attacks

Container Security

Learn how to secure container environments:

  • Container Security Module 1 - Introduction
  • Container Security Module 2 - Building secure Container Images
  • Container Security Module 3 - Developing Containers securely

Advanced Security 1

In-depth insights into advanced security concepts:

  • File Inclusion Vulnerabilities
  • XSS Advanced
  • SQL Injection
  • REST API Security

Cloud Security

Security strategies for cloud environments:

  • Cloud Security Introduction
  • Cloud Security Network Security
  • Cloud Security Secrets Management

Framework Security

Security aspects when using frameworks:

  • Security with Angular
  • Docker/Container Security
  • Security with React

Advanced Web Application Security

In-depth understanding of web application security:

  • Padding Oracle Attacks
  • Race Conditions
  • JSON Injection
  • Content Security Policy (CSP) Header
  • CORS
  • HTTP Parameter Pollution

Security Operations

Operational safety processes and practices:

  • Monitoring: SIEM
  • Incident Response
  • Threat Modeling
  • Security Management

Privacy and Anonymity

Protecting privacy and anonymity in the digital age:

  • Data Protection: Data Anonymization
  • TLS Hardening
  • Zero-Trust

OWASP Top 10

Explore the most common security risks in web applications according to the latest OWASP Top 10 version:

  • Broken Access Control
  • Cryptography Failures
  • Injection
  • Insecure Design
  • Security Misconfiguration
  • Vulnerable and Outdated Components
  • Identification and Authentication Failures
  • Software and Data Integrity Failures
  • Security Logging and Monitoring Failures
  • Server Side Request Forgery

System Security

Basic security practices for operating systems:

  • Database Security
  • System Security Linux
  • System Security Windows

Advanced Security 2

Advanced security topics, part 2:

  • AuthZ (Authorization)
  • Cryptography
  • Security Automation (CI Pipeline)
  • oAuth OpenID JWT

Network Security

Securing networks and communication:

  • Network Security ARP Spoofing
  • Network Security Segmentation
  • Network Security Logging and Monitoring

Application Security Architecture

Development of a secure application architecture:

  • Web Application Firewall
  • Application Security Architecture
  • OWASP Application Security Verification Standard

Authentication and Secrets Management

Authentication and management of secrets:

  • oAuth
  • SAML
  • Mobile App Security

Vulnerability Management

Effective management of security gaps:

  • Vulnerability Scanning CI:CD
  • Malware Basics
  • Third Party Libraries
  • Vulnerability Scanning Nessus

Advanced System Security

Advanced protection of systems:

  • System Security Architecture
  • System Security Architecture WAF

Prior knowledge

The training is suitable for all persons involved in the development process and maintenance of web applications. These are for example:

  • Developers
  • Software Architects
  • Project Manager
  • Scrum Master
  • DevOps-Engineers
  • Administrators

Languages

The modules are available in German, English and French. The languages can be chosen. All modules of a language are provided as a complete package.

Type of delivery

The content is delivered in such a way that it can be easily integrated into your own e-learning platform.

Price model

The provision is carried out through a licensing model. The price is calculated based on the number of languages required and the number of employees to be trained.



We look forward to your contact and will be pleased to send you a suitable offer.