Secure coding in C and C++ for automotive
GoToTraining PROTo date vehicles become highly connected – not only between the internal components, but also to the outside worlds. Todays cars are already running millions of lines of source code, and this introduces a new set of risks to the industry that is historically concerned about safety. Even though some of the attacks are still […]
Web application security for PCI DSS
GoToTraining PROPCI DSS is a mandatory security standard for all companies developing or working with systems that handle credit cards. It does not only require following the secure coding guidelines out there, but also requires developers to train themselves on the latest best practices. But ticking the box annually is not enough. Handling security needs a […]
Technical training: Getting started with MIMIK
GoToTraining PROGetting Started with mimik will provide students with the fundamentals required of Hybrid edgeCloud technology, the backbone of mimik Technology. The course features best-in-class instruction from pioneers of this transformative technology. Join us on a part- or full-time schedule, either on-site or online, in our Remote classroom. Included in the course are instructor-led modules, hands-on […]
Microservices design and architecture workshop, 5 days
GoToTraining PRODuring this 5-days training you will learn an overview of the aspects and practices that should be addressed/used when planning and designing a microservices architecture; you will learn the architectural patterns and practices used throughout the entire development phases. You will learn the patterns and practices used to monitor, troubleshoot and maintain a microservices architecture. […]
Web application security in Java and C#
GoToTraining PROThe curriculum goes through the common Web application security issues following the OWASP Top Ten but goes far beyond it both in coverage and the details. All this is put in the context of the discussed programming languages, and extended by core programming issues, discussing security pitfalls of the used frameworks. So that you are […]
Technical training: Getting started with MIMIK
Getting Started with mimik will provide students with the fundamentals required of Hybrid edgeCloud technology, the backbone of mimik Technology. The course features best-in-class instruction from pioneers of this transformative technology. Join us on a part- or full-time schedule, either on-site or online, in our Remote classroom. Included in the course are instructor-led modules, hands-on […]
Secure coding in C and C++ for automotive
GoToTraining PROTo date vehicles become highly connected – not only between the internal components, but also to the outside worlds. Todays cars are already running millions of lines of source code, and this introduces a new set of risks to the industry that is historically concerned about safety. Even though some of the attacks are still […]
Cloud application security in C# for Azure
GoToTraining PRODuring this 5-days training you will: Understanding how cryptography supports security Learning how to use cryptographic APIs correctly in C# Understanding Web application security issues Detailed analysis of the OWASP Top Ten elements Putting Web application security in the context of C# Managing vulnerabilities in third party components Learn to deal with cloud infrastructure security […]
Cloud application security in C# for Azure
GoToTraining PRODuring this 5-days training you will: Understanding how cryptography supports security Learning how to use cryptographic APIs correctly in C# Understanding Web application security issues Detailed analysis of the OWASP Top Ten elements Putting Web application security in the context of C# Managing vulnerabilities in third party components Learn to deal with cloud infrastructure security […]
Secure coding in C and C++ for automotive
GoToTraining PROTo date vehicles become highly connected – not only between the internal components, but also to the outside worlds. Todays cars are already running millions of lines of source code, and this introduces a new set of risks to the industry that is historically concerned about safety. Even though some of the attacks are still […]
Web application security in Java and C#
GoToTraining PROThe curriculum goes through the common Web application security issues following the OWASP Top Ten but goes far beyond it both in coverage and the details. All this is put in the context of the discussed programming languages, and extended by core programming issues, discussing security pitfalls of the used frameworks. So that you are […]
Microservices design and architecture workshop, 5 days
GoToTraining PRODuring this 5-days training you will learn an overview of the aspects and practices that should be addressed/used when planning and designing a microservices architecture; you will learn the architectural patterns and practices used throughout the entire development phases. You will learn the patterns and practices used to monitor, troubleshoot and maintain a microservices architecture. […]
Python Programming: Advanced
VILT - Virtual Instructor Led TrainingPython® continues to be a popular programming language, perhaps owing to its ability to get a lot of work done in few lines of code, and its versatility. Python is useful for developing custom software tools, applications, web services, and cloud applications. In this course, you’ll build upon your basic Python skills, learning more advanced […]
Web application security for PCI DSS
GoToTraining PROPCI DSS is a mandatory security standard for all companies developing or working with systems that handle credit cards. It does not only require following the secure coding guidelines out there, but also requires developers to train themselves on the latest best practices. But ticking the box annually is not enough. Handling security needs a […]
Introduction to Technical Writing
Park Hotel Moskva 25 Nezabravka Str., Sofia, Sofia, Bulgariahttps://learnvalley.org/product/technical-writing/
Technical training: Getting started with MIMIK
Getting Started with mimik will provide students with the fundamentals required of Hybrid edgeCloud technology, the backbone of mimik Technology. The course features best-in-class instruction from pioneers of this transformative technology. Join us on a part- or full-time schedule, either on-site or online, in our Remote classroom. Included in the course are instructor-led modules, hands-on […]
Kubernetes for Application Developers
GoToTraining PROThis Training conveys the necessary foundation to pack, host, deploy and configure applications for multi-node Kubernetes clusters in containers. Starting with a simple Python script, application resources and core concepts that are necessary to develop, monitor and debug scalable applications with the help of Kubernetes are introduced. Further topics such as network plug-ins, security and […]
Microservices design and architecture workshop, 5 days
GoToTraining PRODuring this 5-days training you will learn an overview of the aspects and practices that should be addressed/used when planning and designing a microservices architecture; you will learn the architectural patterns and practices used throughout the entire development phases. You will learn the patterns and practices used to monitor, troubleshoot and maintain a microservices architecture. […]
Kubernetes for Application Developers
GoToTraining PROThis Training conveys the necessary foundation to pack, host, deploy and configure applications for multi-node Kubernetes clusters in containers. Starting with a simple Python script, application resources and core concepts that are necessary to develop, monitor and debug scalable applications with the help of Kubernetes are introduced. Further topics such as network plug-ins, security and […]
Web application security in Java and C#
GoToTraining PROThe curriculum goes through the common Web application security issues following the OWASP Top Ten but goes far beyond it both in coverage and the details. All this is put in the context of the discussed programming languages, and extended by core programming issues, discussing security pitfalls of the used frameworks. So that you are […]