Click here to close now.

Welcome!

Cloud Expo Authors: Ian Khan, Harry Trott, Carmen Gonzalez, Elizabeth White, Liz McMillan

News Feed Item

Aspect Security Marks eLearning Curriculum Milestone With More Than 100,000 Modules in Use Worldwide

Web-Based Education Series Arms Developers With the Most Current Thinking Around Building Security Into Applications

COLUMBIA, MD -- (Marketwire) -- 12/17/12 -- Aspect Security, a pioneer in application security, today announced that more than 100,000 individual modules of its eLearning curriculum are in use by developers worldwide at many corporate entities, including giants in the financial, shipping and logistics, and airline industries, and large government agencies.

Aspect Security eLearning is a web-based series for developers, managers, testers and security architects that helps companies resist application security breaches by educating those involved in creating applications. Aspect Security's eLearning curriculum features 53 learning modules at three different levels of technical depth.

Each module leverages educational best practices for comprehension and retention. The modules are approximately 20 minutes in length and feature regular quizzes to aid in comprehension and retention. Now, with the addition a module dedicated to mobile application security, Aspect Security's eLearning curriculum offers a complete solution to application security education.

"We are very proud of our eLearning offering, which really stands alone in the industry for its breadth, levels of technical depth and suitability for deployment by even the most distributed global enterprise," said Andi McDowell, VP, Products and Administration, Aspect Security. "We put a great deal of effort into designing a curriculum and a deployment system to meet the needs of a wide range of organizations and raise the bar in the industry for application security education."

"Application security is the single greatest area of vulnerability for enterprise IT right now, and is largely a 'people problem' -- in our experience the single most effective way an organization can address this is to train developers in secure coding," said Jeff Williams, Aspect Security CEO and Co-Founder of the Open Web Application Security Project (OWASP). "In this increasingly connected universe, developers need to be armed with the right knowledge about application security and how to address vulnerabilities so that they can write secure code from the outset."

Angel, global leader in enterprise, cloud-based, Interactive Voice Response (IVR) and call-center customer experience solutions, deployed Aspect's interactive eLearning modules for its secure application development training.

"PCI Level I certification was a huge achievement for us, and thanks to Aspect, the development team was well prepared for the process. With Aspect eLearning we were able to deploy a very cost-effective remote training solution that turned out to be more effective than the instructor-led options we explored," said Ian Macdonald, Senior Systems & Security Architect, Angel.

Download the full case study here https://www.aspectsecurity.com/case-study/

Aspect eLearning Modules
Aspect's eLearning for Secure Application Development includes a comprehensive selection of web based interactive modules. Each module features culturally neutral content that is suitable for use by English-speaking developers around the world. Organizations with Learning Management Systems (LMS) can have the modules delivered directly, or a hosting solution can be provided by Aspect.

The modules are organized into three tiers by level of technical depth:

  • Awareness Series - Includes 11 modules that deliver a general overview of application security suitable for IT executives and managers as well as developers, testers and security architects.
  • Technical Series - Features 35 modules that emphasize more technical topics including the OWASP Top Ten, PCI awareness, how to prevent Cross-Site Scripting, Clickjacking and other attacks, designed for developers, managers, testers, and security architects.
  • Specialist Series - Offers 7 modules on advanced methodologies and application security verification and is geared towards security-focused managers, testers and architects.

Customers may choose to purchase the entire 53 module curriculum or select content a la carte, tailored to meet their specific training needs. Designed for groups rather than individual users, the minimum order is $5,000.

Organizations and developers interested in learning more about Aspect's eLearning for Secure Application Development can download the curriculum, explore a course-mapping guide and view an interactive demo at www.aspectsecurity.com/services/elearning/.

For new customers of the eLearning offering, Aspect Security is offering 15 months for the price of 12, an offer valid through February 1, 2013. For more information, please visit www.aspectsecurity.com/services/elearning/.

About Aspect Security
Founded in 2002, Aspect Security is a consulting firm focused exclusively on application security, ensuring that the software that drives business is protected against hackers. Aspect Security's engineers analyze, test and validate on average of 5,000,000 lines of critical application code every month. The company unearths more than 10,000 vulnerabilities every year across a wide range of technologies and architectures, and the company's practical recommendations dramatically improve clients' security posture.

Aspect Security has taught tens of thousands of people around the world how to build, test and deploy secure applications, making the company a leader in application security training. Flexible delivery options include instructor-led training either in-person or via webcast or on-demand through an innovative eLearning curriculum.

CEO Jeff Williams is a Co-Founder of the Open Web Application Security Project (OWASP), through which he has made vast industry contributions including: the OWASP Top Ten, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Risk Rating Methodology and WebGoat.

For more information, please visit www.aspectsecurity.com.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Dan Chmielewski
Madison Alexander PR
714-832-8716
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@CloudExpo Stories
Operational Hadoop and the Lambda Architecture for Streaming Data Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing...
SYS-CON Events announced today that Vitria Technology, Inc. will exhibit at SYS-CON’s @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Vitria will showcase the company’s new IoT Analytics Platform through live demonstrations at booth #330. Vitria’s IoT Analytics Platform, fully integrated and powered by an operational intelligence engine, enables customers to rapidly build and operationalize advanced analytics to deliver timely business outcomes ...
DevOps is about increasing efficiency, but nothing is more inefficient than building the same application twice. However, this is a routine occurrence with enterprise applications that need both a rich desktop web interface and strong mobile support. With recent technological advances from Isomorphic Software and others, it is now feasible to create a rich desktop and tuned mobile experience with a single codebase, without compromising performance or usability.
SYS-CON Events announced today Arista Networks will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Arista Networks was founded to deliver software-driven cloud networking solutions for large data center and computing environments. Arista’s award-winning 10/40/100GbE switches redefine scalability, robustness, and price-performance, with over 3,000 customers and more than three million cloud networking ports depl...
The speed of software changes in growing and large scale rapid-paced DevOps environments presents a challenge for continuous testing. Many organizations struggle to get this right. Practices that work for small scale continuous testing may not be sufficient as the requirements grow. In his session at DevOps Summit, Marc Hornbeek, Sr. Solutions Architect of DevOps continuous test solutions at Spirent Communications, will explain the best practices of continuous testing at high scale, which is r...
Thanks to Docker, it becomes very easy to leverage containers to build, ship, and run any Linux application on any kind of infrastructure. Docker is particularly helpful for microservice architectures because their successful implementation relies on a fast, efficient deployment mechanism – which is precisely one of the features of Docker. Microservice architectures are therefore becoming more popular, and are increasingly seen as an interesting option even for smaller projects, instead of bein...
Security can create serious friction for DevOps processes. We've come up with an approach to alleviate the friction and provide security value to DevOps teams. In her session at DevOps Summit, Shannon Lietz, Senior Manager of DevSecOps at Intuit, will discuss how DevSecOps got started and how it has evolved. Shannon Lietz has over two decades of experience pursuing next generation security solutions. She is currently the DevSecOps Leader for Intuit where she is responsible for setting and driv...
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @Things...
SYS-CON Events announced today that Open Data Centers (ODC), a carrier-neutral colocation provider, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Open Data Centers is a carrier-neutral data center operator in New Jersey and New York City offering alternative connectivity options for carriers, service providers and enterprise customers.
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along...
PubNub on Monday has announced that it is partnering with IBM to bring its sophisticated real-time data streaming and messaging capabilities to Bluemix, IBM’s cloud development platform. “Today’s app and connected devices require an always-on connection, but building a secure, scalable solution from the ground up is time consuming, resource intensive, and error-prone,” said Todd Greene, CEO of PubNub. “PubNub enables web, mobile and IoT developers building apps on IBM Bluemix to quickly add sc...
Data-intensive companies that strive to gain insights from data using Big Data analytics tools can gain tremendous competitive advantage by deploying data-centric storage. Organizations generate large volumes of data, the vast majority of which is unstructured. As the volume and velocity of this unstructured data increases, the costs, risks and usability challenges associated with managing the unstructured data (regardless of file type, size or device) increases simultaneously, including end-to-...
The excitement around the possibilities enabled by Big Data is being tempered by the daunting task of feeding the analytics engines with high quality data on a continuous basis. As the once distinct fields of data integration and data management increasingly converge, cloud-based data solutions providers have emerged that can buffer your organization from the complexities of this continuous data cleansing and management so that you’re free to focus on the end goal: actionable insight.
Between the compelling mockups and specs produced by your analysts and designers, and the resulting application built by your developers, there is a gulf where projects fail, costs spiral out of control, and applications fall short of requirements. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a new approach where business and development users collaborate – each using tools appropriate to their goals and expertise – to build mo...
The Internet of Things (IoT) is causing data centers to become radically decentralized and atomized within a new paradigm known as “fog computing.” To support IoT applications, such as connected cars and smart grids, data centers' core functions will be decentralized out to the network's edges and endpoints (aka “fogs”). As this trend takes hold, Big Data analytics platforms will focus on high-volume log analysis (aka “logs”) and rely heavily on cognitive-computing algorithms (aka “cogs”) to mak...
With several hundred implementations of IoT-enabled solutions in the past 12 months alone, this session will focus on experience over the art of the possible. Many can only imagine the most advanced telematics platform ever deployed, supporting millions of customers, producing tens of thousands events or GBs per trip, and hundreds of TBs per month. With the ability to support a billion sensor events per second, over 30PB of warm data for analytics, and hundreds of PBs for an data analytics arc...
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use c...
SYS-CON Events announced today that GENBAND, a leading developer of real time communications software solutions, has been named “Silver Sponsor” of SYS-CON's WebRTC Summit, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. The GENBAND team will be on hand to demonstrate their newest product, Kandy. Kandy is a communications Platform-as-a-Service (PaaS) that enables companies to seamlessly integrate more human communications into their Web and mobile applicatio...
VictorOps is making on-call suck less with the only collaborative alert management platform on the market. With easy on-call scheduling management, a real-time incident timeline that gives you contextual relevance around your alerts and powerful reporting features that make post-mortems more effective, VictorOps helps your IT/DevOps team solve problems faster.