Chrys Thorsen

Director of Technology and Training, Mena ICT Consultancy

Chrys Thorsen is a technology and education consultant with 25 years of experience. Her work has taken her around the U.S. and overseas, including as a contractor for the CDC using technology to help fight HIV/AIDS in Africa.

During her career, she has acquired 40 IT certifications, authored over 25 textbooks on a wide range of IT subjects, including secure iOS and Android coding, and created an equal number of IT-related video courses. When not working, Chrys enjoys reading scientific articles and experimenting with Internet-of-Things devices. She currently lives in Virginia with her sister, her cat and her dog which, as she describes it, "have the worst sibling rivalry imaginable."

Content from Chrys Thorsen

CertNexus Cyber Secure Coder
Learning Path
CertNexus Cyber Secure Coder

CertNexus Cyber Secure Coder

Cyber Secure Coder is the ideal learning path for application developers, testers and architects who have previously not had to consider including security in their project. Even students who are new to programming can benefit by instilling security into their thought process before creating their first application. In this path, you will employ best practices in software development to write secure code.

Writing Secure Code in iOS
Learning Path
Writing Secure Code in iOS

Writing Secure Code in iOS

This learning path teaches you how to incorporate security in iOS application development for mobile devices. Focused mostly on Swift, Apple's new programming language, you will learn best practices for addressing the most common security mistakes iOS app developers make. You will also learn the limits of Swift as a secure language, and how to compensate for those limits.

Concise History of Linux
Course
Concise History of Linux

Concise History of Linux

This course is an introduction to offensive Bash scripting and the history of Linux and the Bourne Again shell.

Creating the Lab
Course
Creating the Lab

Creating the Lab

In course two, we will learn about VirtualBox and its role as a hypervisor.

Introduction to Linux, Bash and Python with Basics of the Bourne Again Shell
Course
Introduction to Linux, Bash and Python with Basics of the Bourne Again Shell

Introduction to Linux, Bash and Python with Basics of the Bourne Again Shell

This course is your introduction to Linux, Bash and Python and the basics of the Bourne Again shell.

User and Group Management
Course
User and Group Management

User and Group Management

This course is your introduction to user and group management.

File Permission and Process
Course
File Permission and Process

File Permission and Process

In this course, we will cover file permissions and processes.

Network Reconnaissance
Course
Network Reconnaissance

Network Reconnaissance

In this course, we will cover how to write Bash scripts to conduct network reconnaissance.

Scripting to Scan Web Applications
Course
Scripting to Scan Web Applications

Scripting to Scan Web Applications

In this course, you'll use the tools you created to discover vulnerabilities.

Privilege Escalation
Course
Privilege Escalation

Privilege Escalation

Course eight is an in-depth look at the process of privilege escalation.

Identifying the Need for Security in Your Software Projects
Course
Identifying the Need for Security in Your Software Projects

Identifying the Need for Security in Your Software Projects

The first step in tackling the problem of software security is to understand the challenges you're up against.

Handling Vulnerabilities
Course
Handling Vulnerabilities

Handling Vulnerabilities

Before you focus on specific vulnerabilities and tactics for dealing with them, there are some general strategies that you can employ to prevent vulnerabilities from creeping into your software.

Designing for Security
Course
Designing for Security

Designing for Security

The process you use to design your software should reflect what is important to you, your customers and other project stakeholders.

Designing for Security
Course
Designing for Security

Designing for Security

Learn about developing reusable and proven solutions to reoccurring information security problems.

Developing Secure Code
Course
Developing Secure Code

Developing Secure Code

You have designed the general application architecture and performed threat modeling to identify potential vulnerabilities.

Implementing Common Protections
Course
Implementing Common Protections

Implementing Common Protections

You have identified various common patterns of vulnerabilities in your software. Others have already had to deal with these common vulnerabilities and have developed common approaches for dealing with them, which you can use in your own projects.

Testing Software Security
Course
Testing Software Security

Testing Software Security

As you design and create products throughout the entire software development lifecycle, you will need to test them to ensure they will lead to a high-quality finished software product that is secure and will protect the privacy of users.

Maintaining Security in Deployed Software
Course
Maintaining Security in Deployed Software

Maintaining Security in Deployed Software

You've designed, developed and deployed your application. You tested the application and were confident in its security when you released it.

Exceptional learning experiences powered by LX Labs cyber expertise

Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.