ONLINE APPLICATION SECURITY TRAINING: LIVING DevSecOps

Rethinking the Practice of Security Education

Product teams are operating in a pressure cooker…

  • More code changes, accelerated timelines, innumerable threats

Security education must accommodate this reality …

  • Proactive training, daily practice

… so that we can deliver secure innovative solutions

Buy Now
Free Demo

eLearning Platform

Deliver Highly Scalable On-Demand Application Security Training

An Evergrowing Library We are constantly refreshing existing courses and developing new ones. There are over 30 courses in our catalog for developers, architects, managers, and leaders. The entire catalog is available for one price,. Single courses are available for purchase as well.

Built By Experts Decades of experience in application security and education ranging from training, threat modeling, code review, penetration testing, secure development lifecycle, as well as automation development.

Engaging Content Professional animators and professional voice actors help deliver a stunning experience, keeping viewers engaged and entertained while they absorb key application security concepts.

Flexible Deployments eLearning library of courses are authored in SCORM v1.2, SCORM v2004 3rd Edition, AICC, LTI 1.1, LTI 1.3 formats thereby enabling Cloud Hosted and Self Hosted deployment options.

Role-Based Training Depth of offering best suited for multi-year role-based training initiatives targeting developers, architects, testers, managers and more.

eLearning Program Strategy

1

Certification

Communicate vision of a multi-year training program followed by educating and certifying foundational concepts

2

Expansion

Expand training to offer more advance role-based curricula targeting all stakeholders in product development

3

Continuation

Deliver continuing role-based training to ensure stakeholders stay current with latest threats facing their applications

4

Integration

Add-on integrated remediation guidance within security testing via “Just-in-Time Micro-Lessons”… learn what you need, when you need it most

Role-Based Applications Security Training Program

Infrared Security’s eLearning platform provides the necessary ingredients to develop and deploy a tailored Application Security Training Program. Covering a wide range of application security topics, you have the ability to define role-based eLearning course curricula unique to the roles and responsibilities of key stakeholders within your product development teams.

Business Team

Stage 1

App Sec Foundations
Foundations Exam

Stage 2

Integrating Security Throughout the SDL

Stage 3

Deriving Security Requirements within SDLC Planning Phase

Secure Manager

Stage 1

App Sec Foundations for Managers
Foundational Exam for Manager

Stage 2

Integrating Security Throughout the SDLC

Stage 3

Deriving Security Requirements within SDLC Planning Phase

Secure Developer

Stage 1

App Sec Foundations for Developers
Foundational Exam for Developers

Stage 2

Integrating Security Throughout the SDLC
API Security
Building Secure Apps Series

Stage 3

Docker and App Container Security
Cloud Infrastructure as Code Series

Secure Architect

Stage 1

App Sec Foundations for Developers
Foundational Exam for Developers
Integrating Security Throughout the SDLC

Stage 2

API Security
Threat Modeling
Deriving Security Requirements within SDLC Planning Phase

Stage 3

Building Secure Apps Series
Docker and App Container Security
Cloud Infrastructure as Code Series

Secure Tester

Stage 1

App Sec Foundations
Foundational Exam

Stage 2

Integrating Security Throughout the SDL

Stage 3

Building Secure Apps Series

Testimonials

“My team was unexpectedly hit with a PCI audit by a potential Client, and our Application Security Training program really helped us shine.”
Director of Training, Credit Financial Services
“The development teams were extremely receptive to these training materials… not something we experienced in the past with our previous vendor.”
CISO, Investment Financial Services
“I’m seeing a measurable improvement in the secure development skills of my team after integrating Infrared training in our process.”
VP of Engineering, Automotive Services

Complete Application Security Course Catalog

APP SEC ESSENTIALS SERIES

This Series of Courses provides participants with an understanding of key foundational concepts relating to application security including vulnerabilities and mitigation strategies covering industry-recognized taxonomies. Courses are organized based on a role and technical level to provide a tailored experience for the entire software team at all stages of development.
INTEGRATING SECURITY THROUGHOUT THE SDLC 1 hour
Buy Now
APP SEC FOUNDATIONS 1 hour
Buy Now
APP SEC FOUNDATIONAL EXAM 30 minutes
Buy Now
APP SEC FOUNDATIONS FOR MANAGERS 1 hour
Buy Now
MOBILE APP SEC FOUNDATIONS FOR MANAGERS 1 hour
Buy Now
APP SEC FOUNDATIONAL EXAM FOR MANAGERS 1.5 hours
Buy Now
APP SEC FOUNDATIONS FOR DEVELOPERS LEARNING PATH: 4 hours
Buy Now
INJECTION 15 minutes
BROKEN AUTHENTICATION 30 minutes
SENSITIVE DATA EXPOSURE 25 minutes
XML EXTERNAL ENTITIES 15 minutes
BROKEN ACCESS CONTROL 30 minutes
SECURITY MISCONFIGURATION 25 minutes
CROSS-SITE SCRIPTING 25 minutes
INSECURE DESERIALIZATION 20 minutes
USING COMPONENTS WITH KNOWN VULNERABILITIES 15 minutes
INSUFFICIENT LOGGING AND MONITORING 20 minutes
SERVER-SIDE REQUEST FORGERY 15 minutes
MOBILE APP SEC FOUNDATIONS FOR DEVELOPERS 3 hours
Buy Now
API SECURITY 1.5 hours
Buy Now
FOUNDATIONAL EXAM FOR DEVELOPERS 1 hour
Buy Now

Operations & Compliance

Learners will gain an understanding of key foundational concepts relating to vulnerabilities and mitigation
strategies covering industry-recognized taxonomies.
DERIVING SECURITY REQUIREMENTS WITHIN THE SDLC PLANNING PHASE 30 minutes
Buy Now
THREAT MODELING 1 hour
Buy Now
DOCKER AND APPLICATION CONTAINER SECURITY 30 minutes
Buy Now

Building Secure Applications Series

Learners will gain an understanding of how to apply foundational application security concepts across a
variety of programming languages and technology stacks.
BUILDING SECURE .NET APPLICATIONS 1 hour
Buy Now
BUILDING SECURE JAVA APPLICATIONS 1 hour
Buy Now
BUILDING SECURE JAVASCRIPT APPLICATIONS 1 hour
Buy Now
BUILDING SECURE C/C++ APPLICATIONS 30 minutes
Buy Now
BUILDING SECURE PYTHON APPLICATIONS 1 hour
Buy Now
BUILDING SECURE RUBY APPLICATIONS 1 hour
Buy Now
BUILDING SECURE MOBILE APPLICATIONS 1 hour
Buy Now
BUILDING SECURE GO APPLICATIONS 1 hour
Buy Now

CLOUD: INFRASTRUCTURE AS CODE

Learners will gain an understanding of how to implement various security controls using Infrastructure as Code.
INFRASTRUCTURE AS CODE: IDENTITY AND ACCESS MANAGEMENT IN AWS 1 hour
Buy Now
INFRASTRUCTURE AS CODE: IDENTITY AND ACCESS MANAGEMENT IN GCP 1 hour
Buy Now

UPCOMING COURSE ROAD-MAP

Be on the look out for the following courses coming soon!
SECURING THE SUPPLY CHAIN: MAINTAINING SOFTWARE AND DATA INTEGRITY 30 minutes
Buy Now
THREAT MODELING AND SECURE DESIGN 1 hour
Buy Now

Top 10 Topics

A1 – INJECTION: Learn how to identify and secure the use of interpreters with a focus on SQL Injection.
A2 – BROKEN AUTHENTICATION AND SESSION MANAGEMENT: Learn about the most common attacks used against identity verification and management controls.
A3 – CROSS-SITE SCRIPTING (XSS): Learn about the most prevalent vulnerability facing developers today – Cross-Site Scripting.
A4 – INSECURE DIRECT OBJECT REFERENCES: Learn about the risks of exposing sensitive resource identifiers without proper authorization verification.
A5 – SECURITY MISCONFIGURATION: Learn about the core principles needed to properly secure environmental configuration files.
A6 – SENSITIVE DATA EXPOSURE: Learn about data classification and sensitive data management throughout the application layers.
A7 – MISSING FUNCTION LEVEL ACCESS CONTROL: Learn how to design, implement, and integration function level access control API.
Column 1 Value 10
A8 – CROSS-SITE REQUEST FORGERY (CSRF): Learn how the synchronizer token pattern can thwart the sleeping giant that is Cross-Site Request Forgery.
A9 – USING COMPONENTS WITH KNOWN VULNERABILITIES: Learn about the need for visibility into the security of 3rd party components used by applications.
A10 – UNVALIDATED REDIRECTS AND FORWARDS: Learn how validation and indirection can be used to verify redirect and forward destinations.

Are you looking for Information Security Awareness training for your entire staff?

We have it.

Learn more

Individual Courses

Interested in only one or two courses? We offer any of the available Application Security Training courses for sale individually.
Request a demo