SeQure Technologies homeabout usservicessolutionstrainingcontact us
Training - Information Security Courses

Network Penetration Testing
Assessing one’s readiness in defending information assets comes as a direct result of proper Penetration Testing and to a larger scale of risk management is very critical in protecting your organization. Getting one’s feet wet on penetration testing will benefit not only the company’s security stance but also the individual’s appreciation of what could possibly lie ahead in terms of threats and risks, realization would also set on the extent of knowledge, time and investment to fully prepare one’s company in facing the growing challenges of today and tomorrow’s Internet.

 

Network Vulnerability Assessment
Assessing one’s readiness in defending information assets comes as a direct result of proper Vulnerability Assessment and to a larger scale of risk management is valuable to information security. Getting one’s feet wet on VA will benefit not only the company’s security stance but also the individual’s appreciation of what could possibly lie ahead in terms of threats and risks, realization would also set on the extent of knowledge, time and investment to fully prepare one’s company in facing the growing challenges of today.

 

IT Security Auditing
Information Systems Auditors have always been responsible for consulting with management to help ensure that sufficient and adequate internal controls exist within organizations to mitigate significant risk to an acceptable level. Auditors identify and quantify risk using professional judgment based on knowledge, education, experience, and even history. With the recent updates in technology and management, the auditing profession retools its approach to risk assessment to adapt to the new environment.

Web Application Penetration Testing
The internet today is now an essential tool in bringing together information, personalities, businesses, and more. It enables us to communicate, buy, sell, or trade in our own terms. For all of us users, the stakes are high, for companies who derive revenue from e-commerce, users who trust web applications with sensitive information, and for the criminals who are there waiting for an opportunity to steal payment details or compromise financial databases.

 

OWASP Top Ten
Designed first as an awareness mechanism, the Top 10 covers the most critical web application security flaws via consensus reached by a global consortium of application security experts. The OWASP Top 10 promotes managing risk via an application risk management program, in addition to awareness training, application testing, and remediation. Yet, to manage such risk as an application security practitioner or developer, an appropriate tool kit is necessary.

 

OWASP Security Testing Framework
This training enables the participants a better understanding on testing the security of web applications by utilizing OWASP's testing framework. This framework covers all the important parts that needed to be tested in an application from information gathering, authentication testing, business logic testing, up to denial of service testing and also guides users on how it should be integrated in the SDLC.

 

Foundations of Information Security
In any type of organization, information is considered as the most critical asset. These assets should always be protected; this could be in terms of hardware, software, physical devices, and security personnel. Money could be very well spent in these areas, but it doesn’t really equip you with your weakest link - your people. Having all the high tech security devices is only as strong as your people’s knowledge in handling information.

 
  2012 SeQure Technologies, Inc. All Rights ReservedFind us on FacebookFollow us on twitter