Welcome!

Containers Expo Blog Authors: Jonathan Fries, Elizabeth White, Carmen Gonzalez, Kalyan Ramanathan, Pat Romanski

News Feed Item

Aspect Security Marks eLearning Curriculum Milestone With More Than 100,000 Modules in Use Worldwide

Web-Based Education Series Arms Developers With the Most Current Thinking Around Building Security Into Applications

COLUMBIA, MD -- (Marketwire) -- 12/17/12 -- Aspect Security, a pioneer in application security, today announced that more than 100,000 individual modules of its eLearning curriculum are in use by developers worldwide at many corporate entities, including giants in the financial, shipping and logistics, and airline industries, and large government agencies.

Aspect Security eLearning is a web-based series for developers, managers, testers and security architects that helps companies resist application security breaches by educating those involved in creating applications. Aspect Security's eLearning curriculum features 53 learning modules at three different levels of technical depth.

Each module leverages educational best practices for comprehension and retention. The modules are approximately 20 minutes in length and feature regular quizzes to aid in comprehension and retention. Now, with the addition a module dedicated to mobile application security, Aspect Security's eLearning curriculum offers a complete solution to application security education.

"We are very proud of our eLearning offering, which really stands alone in the industry for its breadth, levels of technical depth and suitability for deployment by even the most distributed global enterprise," said Andi McDowell, VP, Products and Administration, Aspect Security. "We put a great deal of effort into designing a curriculum and a deployment system to meet the needs of a wide range of organizations and raise the bar in the industry for application security education."

"Application security is the single greatest area of vulnerability for enterprise IT right now, and is largely a 'people problem' -- in our experience the single most effective way an organization can address this is to train developers in secure coding," said Jeff Williams, Aspect Security CEO and Co-Founder of the Open Web Application Security Project (OWASP). "In this increasingly connected universe, developers need to be armed with the right knowledge about application security and how to address vulnerabilities so that they can write secure code from the outset."

Angel, global leader in enterprise, cloud-based, Interactive Voice Response (IVR) and call-center customer experience solutions, deployed Aspect's interactive eLearning modules for its secure application development training.

"PCI Level I certification was a huge achievement for us, and thanks to Aspect, the development team was well prepared for the process. With Aspect eLearning we were able to deploy a very cost-effective remote training solution that turned out to be more effective than the instructor-led options we explored," said Ian Macdonald, Senior Systems & Security Architect, Angel.

Download the full case study here https://www.aspectsecurity.com/case-study/

Aspect eLearning Modules
Aspect's eLearning for Secure Application Development includes a comprehensive selection of web based interactive modules. Each module features culturally neutral content that is suitable for use by English-speaking developers around the world. Organizations with Learning Management Systems (LMS) can have the modules delivered directly, or a hosting solution can be provided by Aspect.

The modules are organized into three tiers by level of technical depth:

  • Awareness Series - Includes 11 modules that deliver a general overview of application security suitable for IT executives and managers as well as developers, testers and security architects.
  • Technical Series - Features 35 modules that emphasize more technical topics including the OWASP Top Ten, PCI awareness, how to prevent Cross-Site Scripting, Clickjacking and other attacks, designed for developers, managers, testers, and security architects.
  • Specialist Series - Offers 7 modules on advanced methodologies and application security verification and is geared towards security-focused managers, testers and architects.

Customers may choose to purchase the entire 53 module curriculum or select content a la carte, tailored to meet their specific training needs. Designed for groups rather than individual users, the minimum order is $5,000.

Organizations and developers interested in learning more about Aspect's eLearning for Secure Application Development can download the curriculum, explore a course-mapping guide and view an interactive demo at www.aspectsecurity.com/services/elearning/.

For new customers of the eLearning offering, Aspect Security is offering 15 months for the price of 12, an offer valid through February 1, 2013. For more information, please visit www.aspectsecurity.com/services/elearning/.

About Aspect Security
Founded in 2002, Aspect Security is a consulting firm focused exclusively on application security, ensuring that the software that drives business is protected against hackers. Aspect Security's engineers analyze, test and validate on average of 5,000,000 lines of critical application code every month. The company unearths more than 10,000 vulnerabilities every year across a wide range of technologies and architectures, and the company's practical recommendations dramatically improve clients' security posture.

Aspect Security has taught tens of thousands of people around the world how to build, test and deploy secure applications, making the company a leader in application security training. Flexible delivery options include instructor-led training either in-person or via webcast or on-demand through an innovative eLearning curriculum.

CEO Jeff Williams is a Co-Founder of the Open Web Application Security Project (OWASP), through which he has made vast industry contributions including: the OWASP Top Ten, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Risk Rating Methodology and WebGoat.

For more information, please visit www.aspectsecurity.com.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Dan Chmielewski
Madison Alexander PR
714-832-8716
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@ThingsExpo Stories
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Internet of @ThingsExpo, taking place June 6-8, 2017 at the Javits Center in New York City, New York, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @ThingsExpo New York Call for Papers is now open.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band-aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It does...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...