OWASP A8 - Insecure Deserialization
This module covers insecure deserialization vulnerabilities in applications and how to prevent these flaws.
Insufficient Logging and Monitoring
It is imperative that server administrators maintain robust logs of activity on their servers. This module covers the risks associated with improper monitoring.
This module covers best practices for serialization - the process of turning data objects into binary streams of data.
Infosec Named a Leader in 2019 Gartner Magic Quadrant
Recognized for ability to execute and completeness of vision in Security Awareness Computer-Based Training, learn the latest market trends and what we believe sets Infosec apart.