[vc_row type=”full_width_background” full_screen_row_position=”middle” equal_height=”yes” content_placement=”bottom” column_margin=”default” bg_color=”#ec5326″ mouse_based_parallax_bg=”true” scene_position=”center” layer_one_image=”9941″ layer_one_strength=”0″ layer_two_image=”9495″ layer_three_image=”9496″ layer_four_image=”9497″ layer_five_image=”9498″ text_color=”dark” text_align=”left” top_padding=”100″ bottom_padding=”200″ overlay_strength=”1″ enable_shape_divider=”true” shape_divider_color=”#ffffff” shape_divider_position=”bottom” shape_divider_height=”200″ shape_divider_bring_to_front=”true” bg_image_animation=”none” shape_type=”mountains”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Establish a” font_container=”tag:h3|text_align:left” use_theme_fonts=”yes”][vc_custom_heading text=”SCALABLE APPLICATION SECURITY PROGRAM” use_theme_fonts=”yes”][vc_custom_heading text=”for Managers, Developers,
Testers, and Architects” font_container=”tag:h3|text_align:left” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”20″][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/2″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][image_with_animation image_url=”7745″ alignment=”” animation=”Fade In” hover_animation=”none” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”100%” max_width_mobile=”default”][/vc_column_inner][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/2″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][/vc_column_inner][/vc_row_inner][divider line_type=”No Line” custom_height=”20″][nectar_btn size=”large” button_style=”regular” button_color_2=”Accent-Color” color_override=”#ec5326″ icon_family=”none” text=”GET A FREE DEMO” margin_right=”10″ url=”http://testingwww.kmionline.com/free-security-training-demo/”][nectar_btn size=”large” button_style=”regular” button_color_2=”Accent-Color” color_override=”#ec5326″ icon_family=”none” text=”BUY NOW” url=”http://testingwww.kmionline.com/products/app-sec-training-8-course-bundle/”][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/2″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_row_inner content_placement=”bottom” column_margin=”default” text_align=”left” css=”.vc_custom_1580492648959{margin-right: 50% !important;}”][vc_column_inner column_padding=”padding-5-percent” column_padding_position=”all” background_color=”#ffffff” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”medium_depth” column_border_radius=”5px” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Fulfills PCI DSSv3 6.5 Compliance Requirement!” font_container=”tag:h4|text_align:center” use_theme_fonts=”yes”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”default” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”40″ bottom_padding=”100″ enable_gradient=”true” color_overlay=”#ffffff” color_overlay_2=”#e5e5e5″ gradient_direction=”top_to_bottom” overlay_strength=”1″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”padding-5-percent” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”10px” width=”2/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” overlay_strength=”0.3″ column_border_width=”none” bg_image_animation=”none”][vc_custom_heading text=”Online Application Security Training” font_container=”tag:h5|text_align:left” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”20″][vc_column_text]

Education is the cornerstone of any modern application security program. Developers, Managers, Architects and Testers must be fully aware of a large variety of attacks and, more importantly, how to defend your organization’s web and mobile applications. With that in mind, Infrared Security has built the most effective, educational and entertaining application security eLearning platform on the market, featuring security learning tracks for “technical” and “less-technical” learners. Upon participation, Learners will be able to more readily identify, mitigate, and prevent common security vulnerabilities within their applications and their Software Development Lifecycle (SDLC).

[/vc_column_text][divider line_type=”No Line” custom_height=”40″][vc_column_text]

PCI DSSv3 6.5 Compliance

Infrared Security’s eLearning offerings fulfill your PCI compliance requirements for developers. But beyond that, developers love to learn from Infrared Security’s Online application security training series.Throughout the various modules, we highlight the risks associated with the processing of credit card information throughout the various application layers. Information gleaned from this series can be used to produce secure coding guidelines needed to enforce consistent secure programming practices throughout your organization. Learn how achieving PCI compliance spans people, process, and technology today![/vc_column_text][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” top_margin=”50″ width=”1/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner column_padding=”padding-10-percent” column_padding_position=”all” background_color=”#ffffff” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”large_depth” column_border_radius=”10px” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”HIGHLIGHTS” font_container=”tag:h3|text_align:left” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”20″][vc_column_text]Richly animated entertaining stories make these educational modules extremely enjoyable to watch while absorbing key application security concepts[/vc_column_text][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”50″][vc_column_text]Participants gain a deep understanding of major risks inherent to applications, including web and mobile[/vc_column_text][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”50″][vc_column_text]Role-based training providing a depth of offerings best suited for multi-year training initiatives targeting Managers, Developers, Architects and Testers[/vc_column_text][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”50″][vc_column_text]Flexible deployment options using SCORM compliant course content[/vc_column_text][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”50″][vc_column_text]Fulfills PCI DSSv3 6.5 Compliance Requirement[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”default” bg_color=”#289ccb” scene_position=”center” text_color=”light” text_align=”left” top_padding=”100″ bottom_padding=”100″ overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”eLearning Program Strategy” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”100″][nectar_icon_list animate=”true” color=”default” direction=”vertical” icon_size=”large” icon_style=”border”][nectar_icon_list_item icon_type=”numerical” title=”List Item” id=”1621259306317-5″ tab_id=”1621259306318-1″ header=”Certification” text=”Communicate vision of a multi-year training program followed by educating and certifying foundational concepts”][vc_column_text][/vc_column_text][/nectar_icon_list_item][nectar_icon_list_item icon_type=”numerical” title=”List Item” id=”1621259306421-9″ tab_id=”1621259306422-3″ header=”Expansion” text=”Expand training to offer more advance role-based curricula targeting all stakeholders in product development”][vc_column_text][/vc_column_text][/nectar_icon_list_item][nectar_icon_list_item icon_type=”numerical” title=”List Item” id=”1621259306497-10″ tab_id=”1621259306498-4″ header=”Continuation” text=”Deliver continuing role-based training to ensure stakeholders stay current with latest threats facing their applications”][/nectar_icon_list_item][nectar_icon_list_item icon_type=”numerical” title=”List Item” id=”1621259306567-6″ tab_id=”1621259306568-2″ header=”Integration” text=”Add-on integrated remediation guidance within security testing via “Just-in-Time Micro-Lessons”… learn what you need, when you need it most”][/nectar_icon_list_item][/nectar_icon_list][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”default” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”200″ bottom_padding=”100″ enable_gradient=”true” color_overlay=”#ffffff” color_overlay_2=”#dbdbdb” gradient_direction=”top_to_bottom” overlay_strength=”1″ enable_shape_divider=”true” shape_divider_color=”#289ccb” shape_divider_position=”top” shape_divider_height=”80″ bg_image_animation=”none” shape_type=”mountains”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Role-Based Applications Security Training Program” font_container=”tag:h1|text_align:left” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”60″][vc_column_text]Infrared Security’s eLearning platform provides the necessary ingredients to develop and deploy a tailored Application Security Training Program. Covering a wide range of application security topics, you will have the ability to define role-based eLearning course curricula unique to the roles and responsibilities of key stakeholders within your product development teams. By implementing education across all your technical stakeholders during every stage of the secure development lifecycle, your teams will become more efficient at designing, implementing and verifying secure software.[/vc_column_text][divider line_type=”No Line” custom_height=”60″][vc_custom_heading text=”Business Team” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”60″][vc_row_inner equal_height=”yes” column_margin=”default” text_align=”left”][vc_column_inner column_padding=”padding-3-percent” column_padding_position=”all” centered_text=”true” background_color=”#ffffff” background_color_opacity=”0.1″ background_color_hover=”#ffffff” background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”5px” column_link_target=”_self” width=”1/3″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Stage 1″ font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”30″][vc_column_text]OTTF
OWASP Top Ten Foundations Exam[/vc_column_text][/vc_column_inner][vc_column_inner column_padding=”padding-3-percent” column_padding_position=”all” centered_text=”true” background_color=”#ffffff” background_color_opacity=”0.1″ background_color_hover=”#ffffff” background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”5px” column_link_target=”_self” width=”1/3″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Stage 2″ font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”30″][vc_column_text]Integrating Security Throughout the SDLC[/vc_column_text][/vc_column_inner][vc_column_inner column_padding=”padding-3-percent” column_padding_position=”all” centered_text=”true” background_color=”#ffffff” background_color_opacity=”0.1″ background_color_hover=”#ffffff” background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”5px” column_link_target=”_self” width=”1/3″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Stage 3″ font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”30″][/vc_column_inner][/vc_row_inner][divider line_type=”No Line” custom_height=”60″][vc_custom_heading text=”Secure Manager” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”60″][vc_row_inner equal_height=”yes” column_margin=”default” text_align=”left”][vc_column_inner column_padding=”padding-3-percent” column_padding_position=”all” centered_text=”true” background_color=”#ffffff” background_color_opacity=”0.1″ background_color_hover=”#ffffff” background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”5px” column_link_target=”_self” width=”1/3″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Stage 1″ font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”30″][vc_column_text]OTT4M
Foundational Exam for Managers[/vc_column_text][/vc_column_inner][vc_column_inner column_padding=”padding-3-percent” column_padding_position=”all” centered_text=”true” background_color=”#ffffff” background_color_opacity=”0.1″ background_color_hover=”#ffffff” background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”5px” column_link_target=”_self” width=”1/3″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Stage 2″ font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”30″][vc_column_text]Integrating Security Throughout the SDLC[/vc_column_text][/vc_column_inner][vc_column_inner column_padding=”padding-3-percent” column_padding_position=”all” centered_text=”true” background_color=”#ffffff” background_color_opacity=”0.1″ background_color_hover=”#ffffff” background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”5px” column_link_target=”_self” width=”1/3″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Stage 3″ font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”30″][/vc_column_inner][/vc_row_inner][divider line_type=”No Line” custom_height=”60″][vc_custom_heading text=”Secure Developer” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”60″][vc_row_inner equal_height=”yes” column_margin=”default” text_align=”left”][vc_column_inner column_padding=”padding-3-percent” column_padding_position=”all” centered_text=”true” background_color=”#ffffff” background_color_opacity=”0.1″ background_color_hover=”#ffffff” background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”5px” column_link_target=”_self” width=”1/3″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Stage 1″ font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”30″][vc_column_text]OTT4D
Foundational Exam For Developers
Integrating Security Throughout the SDLC[/vc_column_text][/vc_column_inner][vc_column_inner column_padding=”padding-3-percent” column_padding_position=”all” centered_text=”true” background_color=”#ffffff” background_color_opacity=”0.1″ background_color_hover=”#ffffff” background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”5px” column_link_target=”_self” width=”1/3″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Stage 2″ font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”30″][vc_column_text]Building Secure Applications Series
OWASP API Security Top Ten[/vc_column_text][/vc_column_inner][vc_column_inner column_padding=”padding-3-percent” column_padding_position=”all” centered_text=”true” background_color=”#ffffff” background_color_opacity=”0.1″ background_color_hover=”#ffffff” background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”5px” column_link_target=”_self” width=”1/3″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Stage 3″ font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”30″][vc_column_text]Building Secure Application Series
Docker and App Container Security[/vc_column_text][/vc_column_inner][/vc_row_inner][divider line_type=”No Line” custom_height=”60″][vc_custom_heading text=”Secure Architect” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”60″][vc_row_inner equal_height=”yes” column_margin=”default” text_align=”left”][vc_column_inner column_padding=”padding-3-percent” column_padding_position=”all” centered_text=”true” background_color=”#ffffff” background_color_opacity=”0.1″ background_color_hover=”#ffffff” background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”5px” column_link_target=”_self” width=”1/3″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Stage 1″ font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”30″][vc_column_text]OTT4D
Foundational Exam For Developers
Integrating Security Throughout the SDLC[/vc_column_text][/vc_column_inner][vc_column_inner column_padding=”padding-3-percent” column_padding_position=”all” centered_text=”true” background_color=”#ffffff” background_color_opacity=”0.1″ background_color_hover=”#ffffff” background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”5px” column_link_target=”_self” width=”1/3″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Stage 2″ font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”30″][vc_column_text]Building Secure Applications Series
OWASP API Security Top Ten[/vc_column_text][/vc_column_inner][vc_column_inner column_padding=”padding-3-percent” column_padding_position=”all” centered_text=”true” background_color=”#ffffff” background_color_opacity=”0.1″ background_color_hover=”#ffffff” background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”5px” column_link_target=”_self” width=”1/3″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Stage 3″ font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”30″][vc_column_text]Building Secure Application Series
Docker and App Container Security
Threat Modeling[/vc_column_text][/vc_column_inner][/vc_row_inner][divider line_type=”No Line” custom_height=”60″][vc_custom_heading text=”Secure Tester” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”60″][vc_row_inner equal_height=”yes” column_margin=”default” text_align=”left”][vc_column_inner column_padding=”padding-3-percent” column_padding_position=”all” centered_text=”true” background_color=”#ffffff” background_color_opacity=”0.1″ background_color_hover=”#ffffff” background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”5px” column_link_target=”_self” width=”1/3″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Stage 1″ font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”30″][vc_column_text]OTT4D
Foundational Exam For Developers
Integrating Security Throughout the SDLC[/vc_column_text][/vc_column_inner][vc_column_inner column_padding=”padding-3-percent” column_padding_position=”all” centered_text=”true” background_color=”#ffffff” background_color_opacity=”0.1″ background_color_hover=”#ffffff” background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”5px” column_link_target=”_self” width=”1/3″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Stage 2″ font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”30″][vc_column_text]Building Secure Applications Series[/vc_column_text][/vc_column_inner][vc_column_inner column_padding=”padding-3-percent” column_padding_position=”all” centered_text=”true” background_color=”#ffffff” background_color_opacity=”0.1″ background_color_hover=”#ffffff” background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”5px” column_link_target=”_self” width=”1/3″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Stage 3″ font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][divider line_type=”Full Width Line” line_thickness=”1″ divider_color=”default” custom_height=”30″][vc_column_text]Threat Modeling
Building Secure Application Series[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text][/vc_column_text][/vc_column][/vc_row][vc_row type=”full_width_content” full_screen_row_position=”middle” column_margin=”default” bg_color=”#ffffff” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”100″ bottom_padding=”100″ color_overlay=”#ffffff” overlay_strength=”1″ shape_divider_color=”#ffffff” shape_divider_position=”bottom” shape_divider_height=”100″ bg_image_animation=”none” shape_type=”curve_opacity”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Testimonials” font_container=”tag:h2|text_align:center” use_theme_fonts=”yes”][vc_custom_heading text=”eLearning Program Strategy” font_container=”tag:h5|text_align:left” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”20″][testimonial_slider style=”multiple_visible” color=”extra-color-1-dark”][testimonial star_rating=”none” title=”Testimonial” id=”1621259307115-1″ name=”Director of Training – Credit Financial Services” quote=”“My team was unexpectedly hit with a PCI audit by a potential Client, and our Application Security Training program really helped us shine.”” tab_id=”1621259307115-5″][testimonial star_rating=”none” title=”Testimonial” id=”1621259307194-10″ name=”CISO – Investment Financial Services” quote=”“The development teams were extremely receptive to these training materials… not something we experienced in the past with our previous vendor.”” tab_id=”1621259307194-4″][testimonial star_rating=”none” title=”Testimonial” id=”1621259307267-1″ name=”VP of Engineering – Automotive Services” quote=”“I’m seeing a measurable improvement in the secure development skills of my team after integrating Infrared training in our process.”” tab_id=”1621259307268-10″][/testimonial_slider][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”default” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”140″ enable_gradient=”true” color_overlay=”#e5e5e5″ color_overlay_2=”#ffffff” gradient_direction=”top_to_bottom” overlay_strength=”1″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Complete Application Security Course Catalog” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”120″][vc_custom_heading text=”OWASP Top Ten Series” font_container=”tag:h5|text_align:left” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”15″][vc_custom_heading text=”Learners will gain an understanding of key foundational concepts relating to vulnerabilities and mitigation strategies covering industry recognized taxonomies.” font_container=”tag:p|text_align:left” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”10″][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”3px” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][nectar_horizontal_list_item columns=”3″ column_layout_using_3_columns=”large_first” col_1_text_align=”left” col_2_text_align=”left” col_3_text_align=”left” col_1_text_element=”p” col_2_text_element=”p” col_3_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”OWASP TOP TEN FOR DEVELOPERS” col_2_content=”3 hours” cta_1_text=”Buy Now” cta_1_url=”http://testingwww.kmionline.com/products/owasp-top-10-training-for-developers/”][nectar_horizontal_list_item columns=”3″ column_layout_using_3_columns=”large_first” col_1_text_align=”left” col_2_text_align=”left” col_3_text_align=”left” col_1_text_element=”p” col_2_text_element=”p” col_3_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”OWASP MOBILE TOP TEN FOR DEVELOPERS” col_2_content=”3 hours” cta_1_text=”Buy Now” cta_1_url=”http://testingwww.kmionline.com/products/owasp-mobile-top-ten-for-developers/”][nectar_horizontal_list_item columns=”3″ column_layout_using_3_columns=”large_first” col_1_text_align=”left” col_2_text_align=”left” col_3_text_align=”left” col_1_text_element=”p” col_2_text_element=”p” col_3_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”OWASP TOP TEN FOUNDATIONS COURSE” col_2_content=”1 hour” cta_1_text=”Buy Now” cta_1_url=”http://testingwww.kmionline.com/products/owasp-top-ten-foundations”][nectar_horizontal_list_item columns=”3″ column_layout_using_3_columns=”large_first” col_1_text_align=”left” col_2_text_align=”left” col_3_text_align=”left” col_1_text_element=”p” col_2_text_element=”p” col_3_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”OWASP TOP TEN FOR MANAGERS” col_2_content=”1 hour” cta_1_text=”Buy Now” cta_1_url=”http://testingwww.kmionline.com/products/owasp-top-ten-for-managers/”][nectar_horizontal_list_item columns=”3″ column_layout_using_3_columns=”large_first” col_1_text_align=”left” col_2_text_align=”left” col_3_text_align=”left” col_1_text_element=”p” col_2_text_element=”p” col_3_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”OWASP MOBILE TOP TEN FOR MANAGERS” col_2_content=”1 hour” cta_1_text=”Buy Now” cta_1_url=”http://testingwww.kmionline.com/products/owasp-mobile-top-ten-for-managers/”][nectar_horizontal_list_item columns=”3″ column_layout_using_3_columns=”large_first” col_1_text_align=”left” col_2_text_align=”left” col_3_text_align=”left” col_1_text_element=”p” col_2_text_element=”p” col_3_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”OWASP API Security Top Ten” col_2_content=”1.5 hour” cta_1_text=”Buy Now” cta_1_url=”http://testingwww.kmionline.com/products/owasp-api-security-top-ten”][/vc_column_inner][/vc_row_inner][vc_custom_heading text=”” font_container=”tag:p|text_align:left” use_theme_fonts=”yes”][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”100″ overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Building Secure Applications Series” font_container=”tag:h5|text_align:left” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”15″][vc_custom_heading text=”Learners will gain an understanding of how to apply foundational application security concepts across a variety of programming languages and technology stacks.” font_container=”tag:p|text_align:left” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”10″][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”3px” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][nectar_horizontal_list_item columns=”3″ column_layout_using_3_columns=”large_first” col_1_text_align=”left” col_2_text_align=”left” col_3_text_align=”left” col_1_text_element=”p” col_2_text_element=”p” col_3_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”BUILDING SECURE .NET APPLICATIONS” col_2_content=”1 hour” cta_1_text=”Buy Now” cta_1_url=”http://testingwww.kmionline.com/products/building-secure-asp-net-applications/”][nectar_horizontal_list_item columns=”3″ column_layout_using_3_columns=”large_first” col_1_text_align=”left” col_2_text_align=”left” col_3_text_align=”left” col_1_text_element=”p” col_2_text_element=”p” col_3_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”BUILDING SECURE JAVA APPLICATIONS” col_2_content=”1 hour” cta_1_text=”Buy Now” cta_1_url=”http://testingwww.kmionline.com/products/building-secure-java-ee-applications/”][nectar_horizontal_list_item columns=”3″ column_layout_using_3_columns=”large_first” col_1_text_align=”left” col_2_text_align=”left” col_3_text_align=”left” col_1_text_element=”p” col_2_text_element=”p” col_3_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”BUILDING SECURE JAVASCRIPT APPLICATIONS” col_2_content=”1 hour” cta_1_text=”Buy Now” cta_1_url=”http://testingwww.kmionline.com/products/building-secure-javascript-applications/”][nectar_horizontal_list_item columns=”3″ column_layout_using_3_columns=”large_first” col_1_text_align=”left” col_2_text_align=”left” col_3_text_align=”left” col_1_text_element=”p” col_2_text_element=”p” col_3_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”BUILDING SECURE C/C++ APPLICATIONS” col_2_content=”30 minutes” cta_1_text=”Buy Now” cta_1_url=”http://testingwww.kmionline.com/products/building-secure-native-applications/”][nectar_horizontal_list_item columns=”3″ column_layout_using_3_columns=”large_first” col_1_text_align=”left” col_2_text_align=”left” col_3_text_align=”left” col_1_text_element=”p” col_2_text_element=”p” col_3_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”BUILDING SECURE PYTHON APPLICATIONS” col_2_content=”1 hour” cta_1_text=”Buy Now” cta_1_url=”http://testingwww.kmionline.com/products/building-secure-python-applications/”][nectar_horizontal_list_item columns=”3″ column_layout_using_3_columns=”large_first” col_1_text_align=”left” col_2_text_align=”left” col_3_text_align=”left” col_1_text_element=”p” col_2_text_element=”p” col_3_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”BUILDING SECURE RUBY APPLICATIONS” col_2_content=”1 hour” cta_1_text=”Buy Now” cta_1_url=”http://testingwww.kmionline.com/products/building-secure-ruby-applications-copy/”][nectar_horizontal_list_item columns=”3″ column_layout_using_3_columns=”large_first” col_1_text_align=”left” col_2_text_align=”left” col_3_text_align=”left” col_1_text_element=”p” col_2_text_element=”p” col_3_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”BUILDING SECURE MOBILE APPLICATIONS” col_2_content=”1 hour” cta_1_text=”Buy Now” cta_1_url=”http://testingwww.kmionline.com/products/building-secure-mobile-applications/”][/vc_column_inner][/vc_row_inner][vc_custom_heading text=”*Course to be released in 2020″ font_container=”tag:p|text_align:left” use_theme_fonts=”yes”][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”100″ bottom_padding=”100″ overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Operations & Compliance” font_container=”tag:h5|text_align:left” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”15″][vc_custom_heading text=”Learners will gain an understanding of key foundational concepts relating to vulnerabilities and mitigation strategies covering industry regonized taxonomies.” font_container=”tag:p|text_align:left” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”10″][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”3px” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][nectar_horizontal_list_item columns=”3″ column_layout_using_3_columns=”large_first” col_1_text_align=”left” col_2_text_align=”left” col_3_text_align=”left” col_1_text_element=”p” col_2_text_element=”p” col_3_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”INTEGRATING SECURITY THROUGHOUT THE SDLC” col_2_content=”1 hour” cta_1_text=”Buy Now” cta_1_url=”http://testingwww.kmionline.com/products/integrating-security-throughout-the-sdlc/”][nectar_horizontal_list_item columns=”3″ column_layout_using_3_columns=”large_first” col_1_text_align=”left” col_2_text_align=”left” col_3_text_align=”left” col_1_text_element=”p” col_2_text_element=”p” col_3_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”THREAT MODELING” col_2_content=”1 hour” cta_1_text=”Buy Now” cta_1_url=”http://testingwww.kmionline.com/products/application-security-threat-modeling/”][nectar_horizontal_list_item columns=”3″ column_layout_using_3_columns=”large_first” col_1_text_align=”left” col_2_text_align=”left” col_3_text_align=”left” col_1_text_element=”p” col_2_text_element=”p” col_3_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”DOCKER AND APP CONTAINER SECURITY” col_2_content=”30 minutes” cta_1_text=”Buy Now” cta_1_url=”http://testingwww.kmionline.com/products/docker-app-container-security/”][/vc_column_inner][/vc_row_inner][vc_custom_heading text=”” font_container=”tag:p|text_align:left” use_theme_fonts=”yes”][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”default” bg_color=”#289ccb” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”100″ bottom_padding=”100″ overlay_strength=”0.3″ enable_shape_divider=”true” shape_divider_color=”#ffffff” shape_divider_position=”top” shape_divider_height=”100″ bg_image_animation=”none” shape_type=”curve”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_row_inner column_margin=”default” translate_y=”-150″ text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/2″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][image_with_animation image_url=”7810″ alignment=”right” animation=”Fade In” hover_animation=”none” border_radius=”none” box_shadow=”none” image_loading=”default” max_width=”125%” max_width_mobile=”default”][/vc_column_inner][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ font_color=”#ffffff” column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/2″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][divider line_type=”No Line” custom_height=”250″][vc_custom_heading text=”OWASP (2017) TOP 10″ font_container=”tag:h2|text_align:left|color:%23ffffff” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”20″][vc_column_text]This series of eLearning modules focuses on the most common security vulnerabilities and attack vectors facing application developers today as defined by the OWASP Top Ten. Participants of these modules will explore the OWASP Top Ten through detailed analysis of real-world examples, rich visualizations of attacks, as well as detailed discussions of mitigation strategies with supporting code examples. After completing these modules, participants will be able to more readily identify, mitigate, and prevent common security vulnerabilities within their own applications.[/vc_column_text][divider line_type=”No Line” custom_height=”20″][nectar_btn size=”jumbo” button_style=”see-through-2″ color_override=”#ffffff” hover_color_override=”#ffffff” hover_text_color_override=”#000000″ icon_family=”none” url=”http://testingwww.kmionline.com/products/owasp-top-10-training-for-developers/” text=”Buy Now”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”default” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ enable_shape_divider=”true” shape_divider_color=”#289ccb” shape_divider_position=”top” shape_divider_height=”200″ bg_image_animation=”none” shape_type=”tilt”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_row_inner column_margin=”default” translate_y=”-200″ text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Top 10 Topics” font_container=”tag:h2|text_align:left|color:%23ffffff” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”40″][/vc_column_inner][/vc_row_inner][vc_row_inner column_margin=”default” translate_y=”-200″ text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color=”#ffffff” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”5px” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”accent-color” col_1_content=”A1 – INJECTION: Learn how to identify and secure the use of interpreters with a focus on SQL Injection.”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”accent-color” col_1_content=”A2 – BROKEN AUTHENTICATION AND SESSION MANAGEMENT: Learn about the most common attacks used against identity verification and management controls.”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”accent-color” col_1_content=”A3 – CROSS-SITE SCRIPTING (XSS): Learn about the most prevalent vulnerability facing developers today – Cross-Site Scripting.”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”accent-color” col_1_content=”A4 – INSECURE DIRECT OBJECT REFERENCES: Learn about the risks of exposing sensitive resource identifiers without proper authorization verification.”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”accent-color” col_1_content=”A5 – SECURITY MISCONFIGURATION: Learn about the core principles needed to properly secure environmental configuration files.”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”accent-color” col_1_content=”A6 – SENSITIVE DATA EXPOSURE: Learn about data classification and sensitive data management throughout the application layers.”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”accent-color” col_1_content=”A7 – MISSING FUNCTION LEVEL ACCESS CONTROL: Learn how to design, implement, and integration function level access control API.”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”accent-color” col_1_content=”A8 – CROSS-SITE REQUEST FORGERY (CSRF): Learn how the synchronizer token pattern can thwart the sleeping giant that is Cross-Site Request Forgery.”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”accent-color” col_1_content=”A9 – USING COMPONENTS WITH KNOWN VULNERABILITIES: Learn about the need for visibility into the security of 3rd party components used by applications.”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”accent-color” col_1_content=”A10 – UNVALIDATED REDIRECTS AND FORWARDS: Learn how validation and indirection can be used to verify redirect and forward destinations.”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”default” bg_color=”#289ccb” scene_position=”center” text_color=”light” text_align=”left” top_padding=”100″ bottom_padding=”200″ overlay_strength=”0.3″ enable_shape_divider=”true” shape_divider_color=”#289ccb” shape_divider_position=”top” shape_divider_height=”100″ bg_image_animation=”none” shape_type=”curve”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Are you looking for Information Security Awareness training for your entire staff?” font_container=”tag:h3|text_align:left|color:%23ffffff” use_theme_fonts=”yes”][vc_custom_heading text=”We have it.” font_container=”tag:h1|text_align:left|color:%23ffffff” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”20″][nectar_cta btn_style=”see-through” heading_tag=”h3″ text_color=”#ffffff” button_color=”default” link_type=”regular” alignment=”left” display=”block” link_text=”Learn More” url=”http://testingwww.kmionline.com/security-awareness-course/”][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”default” bg_color=”#f2f2f2″ scene_position=”center” text_color=”dark” text_align=”left” top_padding=”100″ bottom_padding=”100″ overlay_strength=”0.3″ enable_shape_divider=”true” shape_divider_color=”#289ccb” shape_divider_position=”top” shape_divider_height=”80″ bg_image_animation=”none” shape_type=”curve”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ font_color=”#ffffff” column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none” translate_y=”-50%”][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner column_padding=”padding-5-percent” column_padding_position=”all” centered_text=”true” background_color=”#000000″ background_color_opacity=”1″ background_color_hover=”#ec5326″ background_hover_color_opacity=”1″ font_color=”#ffffff” column_shadow=”x_large_depth” column_border_radius=”10px” top_margin=”15″ column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none” enable_animation=”true” animation=”flip-in-vertical”][vc_custom_heading text=”Individual Courses” font_container=”tag:h2|text_align:center” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”15″][vc_custom_heading text=”Interested in only one or two courses? We offer any of the available Application Security Training courses for sale individually.” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][nectar_btn size=”large” button_style=”see-through-2″ color_override=”#ffffff” hover_color_override=”#ffffff” hover_text_color_override=”#000000″ icon_family=”none” url=”http://testingwww.kmionline.com/contact-us” text=”Request a Demo” margin_top=”30″ margin_bottom=”1″][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row type=”full_width_content” full_screen_row_position=”middle” column_margin=”default” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”100″ bottom_padding=”100″ enable_gradient=”true” color_overlay=”#f2f2f2″ color_overlay_2=”#ffffff” gradient_direction=”top_to_bottom” overlay_strength=”1″ shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][nectar_woo_products product_type=”all” category=”application-security-training” columns=”4″ orderby=”date” order=”DESC” carousel=”1″ script=”carouFredSel” controls_on_hover=”1″][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” column_margin=”default” bg_color=”#289ccb” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”0100″ bottom_padding=”100″ overlay_strength=”0.3″ enable_shape_divider=”true” shape_divider_color=”#ffffff” shape_divider_position=”top” shape_divider_height=”50″ bg_image_animation=”none” shape_type=”mountains”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ font_color=”#020202″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Our new Course Roadmap” font_container=”tag:h2|text_align:left|color:%23ffffff” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”15″][vc_custom_heading text=”All the courses listed below are included in the subscription price. No additional charge!” font_container=”tag:p|text_align:left|color:%23ffffff” use_theme_fonts=”yes”][divider line_type=”No Line” custom_height=”10″][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color=”#ffffff” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”small_depth” column_border_radius=”3px” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Q1 2020:” font_container=”tag:h3|text_align:left” use_theme_fonts=”yes” css=”.vc_custom_1580504946801{padding-top: 2% !important;padding-right: 2% !important;padding-bottom: 2% !important;padding-left: 2% !important;}”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”Building Secure Java Applications” (60 mins): This will be a complete rewrite of our existing “Building Secure JavaEE Applications” course updated with more modern Java frameworks, practices, etc.”][/vc_column_inner][/vc_row_inner][vc_row_inner column_margin=”default” text_align=”left”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color=”#ffffff” background_color_opacity=”1″ background_hover_color_opacity=”1″ font_color=”#000000″ column_shadow=”small_depth” column_border_radius=”3px” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Q2 2020:” font_container=”tag:h3|text_align:left” use_theme_fonts=”yes” css=”.vc_custom_1580504974524{padding-top: 2% !important;padding-right: 2% !important;padding-bottom: 2% !important;padding-left: 2% !important;}”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”“OWASP Top Ten for Managers” (45 mins) – This will be an update to the existing course.”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”“OWASP Top Ten for Developers” (60 mins) – This will be an update to the existing course.”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”Building Secure .NET Applications” (60 min) – This will be a complete rewrite of our existing “Building Secure ASP.NET Applications” course updated with more modern .NET frameworks, practices, etc.”][/vc_column_inner][/vc_row_inner][vc_row_inner column_margin=”default” text_align=”left” el_id=”roadmap”][vc_column_inner column_padding=”no-extra-padding” column_padding_position=”all” background_color=”#ffffff” background_color_opacity=”1″ background_hover_color_opacity=”1″ font_color=”#000000″ column_shadow=”small_depth” column_border_radius=”3px” column_link_target=”_self” width=”1/1″ tablet_width_inherit=”default” overlay_strength=”0.3″ column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_custom_heading text=”Q3 and Q4 2020 (working titles):” font_container=”tag:h3|text_align:left” use_theme_fonts=”yes” css=”.vc_custom_1580505092767{padding-top: 2% !important;padding-right: 2% !important;padding-bottom: 2% !important;padding-left: 2% !important;}”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”“Building Secure Native Applications (C/C++)” (< 30 min) – New course covering native system-level programming languages”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”“Security Awareness: GDPR” (< 30 min)- New course covering GDPR from a general awareness perspective”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”“Application Security: GDPR” (< 30 min)- New course covering GDPR from the perspective of application security / secure development”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”“Docker Security” (< 30 min) – New course covering the Docker containerization technology from the perspective of deployment security”][nectar_horizontal_list_item columns=”1″ col_1_text_align=”left” col_1_text_element=”p” font_family=”p” hover_effect=”default” hover_color=”extra-color-1″ col_1_content=”“Building Secure JavaScript Applications” (60 min) – Complete rewrite of existing course covering the latest frameworks”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]