Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Secure Development
Building software with security best practices to prevent vulnerabilities.
In this series we expand on our Agile Foundation qualification and look at the specific role of the Scrum Master in Agile project management. We also prepare for the EXIN accredited Agile Scrum Master certification.
Learn DevOps concepts and principles. Become a DevOps Professional. Prepare for the EXIN DevOps Professional certification exam.
Prepare for the EXIN DevOps Professional certification. Learn DevOps concepts, principles, and practice with sample exams.
The AWS Certified DevOps Engineer professional certification is a course from Amazon Web Services (AWS) that tests a candidate's ability to deploy, manage, and maintain distributed applications on AWS.
Join a conversation with healthtech cybersecurity experts Phil Englert, Patty Ryan, Anahi Santiago and Luisa Soares de Brito in a conversation about managing hospital device security.
Learn about types of vulnerabilities, the exploits that can occur from those vulnerabilities, and the programming practices that will help prevent exploitation in an application!
The Cisco Certified DevNet Associate (200-901) show is produced to help the software developer, networking professional and IT professional to achieve the latest Cisco certification offer, the Cisco Certified DevNet Associate certification.
Learn how to do more with less! Join Vishak Raman in a discussion of cybersecurity mesh architecture, designed to make security more composable and scalable.
Join Prem Nithin R in an exploration of Fortinet and mesh architecture.
Version control is a cryptic yet essential part of a software development team. Git is a distributed version control system that allows collaboration and management of large scale software products (as well as other types of projects)
The OWASP Top 10, which highlights the top ten cybersecurity risks. Dive into each risk category, risk mitigations strategies and pro tips today!
Learn about OWASP's encryption related cybersecurity concerns, risk mitigation strategies and pro tips!
Learn about OWASP's design related cybersecurity concerns, risk mitigation strategies and pro tips!
Learn about OWASP's misconfiguration related cybersecurity concerns, risk mitigation strategies and pro tips!
In this series, we are going to take a look at programming using the Python programming language. If you have tried to start before and just spun your wheels, then you should give it a try again.
This course is designed to teach you about the 2021 version of the OWASP Top 10 Web Application Vulnerabilities. The OWASP Top 10 is a list of the most critical security risks to web applications, and it is widely used by organizations to improve their web application security.
Join Hannah McCartney your trusted AI guide and explore the top 10 categories of application security risk.
Jonathan Andresen, Senior Director, Marketing and Products, Asia Pacific and Japan, Bitglass examines the shift to Secure Access Service Edge (SASE) architecture in response to evolving cyber threats like the SolarWinds breach. Learn about modern breach trends, SASE's key pillars, and the cost-benefit analysis of SASE protection versus data breaches.
Tal Kollender highlights how human errors and default settings lead to 80% of ransomware attacks. Discover the risks of manual remediation and how automation can reduce misconfigurations, shrinking the attack surface and enhancing network protection.