This module discusses the risks caused by buffer overflows and how to avoid them.
Using Components with Known Vulnerabilities
This module discusses use of components with known vulnerabilities (such as libraries and frameworks) that may undermine application defenses and enable various attacks.
Top 25 #1 - SQL Injection
This module discusses the risks of SQL injection attacks and how to prevent them.
Infosec Named a Leader in 2019 Gartner Magic Quadrant
Recognized for ability to execute and completeness of vision in Security Awareness Computer-Based Training, learn the latest market trends and what we believe sets Infosec apart.