Course Catalog

*Courses may vary.

Search Courses

 
 
 
Reset

Secure Data Storage (Video)

This module covers how to securely store personal data. 2:31 minutes

Improper Error Handling

Errors are a fact of life in any system. But what happens when an error report ends up revealing a weakness? Take a closer look at the problem of improper error handling. 3:26 minutes

Buffer Overflow

This module discusses the risks caused by buffer overflows and how to avoid them. 2:56 minutes

Acceptable Use Policy

When you start a new job or enroll in a new school, you’ll often be asked to review and sign an Acceptable Use Policy for the network. Let’s take a quick look at the purpose and contents of an AUP. 4:39 minutes

XML External Entitites (XXE)

This lesson covers how XXE attacks are executed, and how to prevent those attacks on your applications. 3:24 minutes

Insecure Deserialization

This module covers best practices for serialization - the process of turning data objects into binary streams of data. 4:06 minutes

Suspicious Hosts

Suspicious hosts are known malicious or potentially unsafe IP addresses or hostnames. This module will show how safe browsing can protect Internet users from malicious attacks from suspicious hosts. 3:50 minutes

Top 25 #1 - SQL Injection

This module discusses the risks of SQL injection attacks and how to prevent them. 2:20 minutes

OWASP A7 - Cross-Site Scripting (XSS)

This module covers cross-site scripting. 4:18 minutes

OWASP A8 - Insecure Deserialization

This module covers insecure deserialization vulnerabilities in applications and how to prevent these flaws. 4:11 minutes

OWASP A5- Broken Access Control

This module covers broken access control, types of attacks and how to prevent them. 3:55 minutes

OWASP A3 - Sensitive Data Exposure

This module covers sensitive data and how to protect it. 5:31 minutes

OWASP A4 - XML External Entities (XXE)

This module covers XML external entities, their flaws and how to protect them. 4:40 minutes

OWASP A2 - Broken Authentication

This module covers authentication vulnerabilities and session management. 6:05 minutes

OWASP A1 - Injection

This module covers various types of injection and the associated risks to applications 4:35 minutes

OWASP Top Ten Overview

This module will cover the Open Web Application Security Project’s list of the ten most dangerous Web application security flaws. 36:10 minutes

COPPA

This module covers the provisions of the Children’s Online Privacy Protection Act (COPPA), when an organization is subject to COPPA requirements, and how to ensure compliance with COPPA provisions. 6:11 minutes

CPNI for Providers

This security and awareness training covers Customer Proprietary Network Information, or CPNI. 7:56 minutes

CPNI for Consumers

This security and awareness training covers Customer Proprietary Network Information, or CPNI. 7:20 minutes

Safe Web Browsing for Financial Institutions

Our interactive Safe Browsing module shows how hackers can launch attacks on financial institutions from unsafe websites and outlines best practices for safe browsing for financial sector employees. 12:15 minutes

Safe Web Browsing for Educators

Our interactive Safe Browsing module shows learners how hackers can launch attacks on educational institutions from unsafe websites and outlines best practices for safe browsing. 12:18 minutes

Safe Web Browsing for Healthcare Executives

This module will explain safe browsing best practices, and provide guidance for executives to implement and enforce safe-browsing policies to avoid exposure of protected health information. 12:58 minutes

Safe Web Browsing for Healthcare Managers

This module shows healthcare managers how PHI can be compromised through malicious plugins and downloads, and reinforces the need for managerial reinforcement of internal safe-browsing policies. 12:40 minutes

Safe Web Browsing for Healthcare Professionals and Providers

This module will define safe browsing and show healthcare professionals how PHI can be compromised through malicious plugins and downloads. 12:33 minutes

Safe Web Browsing for Executives

This module will explain safe browsing best practices and provide guidance on how executives can work with IT and managers to implement and enforce safe-browsing policies. 11:32 minutes

Safe Web Browsing for Managers

This module shows managers how hackers launch attacks from unsafe websites and reinforces the need for managerial reinforcement of internal safe-browsing policies. 11:47 minutes
Techguard Shield logo

Request your free demo today.

Please complete and submit the form below.

How Did You Hear About Us? *

Privacy Policy

Please check our Privacy Policy to see how we protect and manage your submitted data.

TechGuard Security LLC needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Consent

Are you ready?

Take the next steps

Reach out to one of our cybersecurity experts today.

Get Started