Security awareness games by Infosec
On-demand training for every cybersecurity role
Certification training from industry experts
2021 IT & Security Talent Pipeline Study
Cyber Work Podcast
New cybersecurity career conversations every week
Join a team dedicated to making a difference.
Duration: 2:56 Minutes
This module discusses the risks caused by buffer overflows and how to avoid them.
This module covers best practices for serialization - the process of turning data objects into binary streams of data.
This module discusses use of components with known vulnerabilities (such as libraries and frameworks) that may undermine application defenses and enable various attacks.
This module covers XML external entities, their flaws and how to protect them.