Content tagged as 'Network-Security'

Here is a list of all the content that has been tagged as network-security.

Workshop - Init Security Titans

Workshop to initialise, train and deploy the Jade Security Champions across the Jade Development Teams.

Cloud Security

Discussion about Kim's new book on Cloud Security, some of the content, and links to other useful resources around securing your Cloud environments.

Cloud Security - Quick Reference

Are you looking to achieve a good understanding of your responsibilities as well as your CSPs responsibilities to make sure your security stature in the Cloud is where you need it to be? Do you need the technical direction required to create your secure Cloud environment? You can think of this book as your technical Cloud consultant.

Docker Security

Discussion about Kim's new [book on Docker Security](/publication/docker-security/), some of the content, and links to other useful resources around securing your Docker deployments.

Workshop - Building Security Into Your Development Teams

Kim's flagship Software Developer focussed training, this time at OWASP New Zealand Day conference.

Building Security into Your Development Teams (workshop) $495 + GST per student

Full Day Interactive Workshop focussing on building security into your Development Team(s).

Holistic Info-Sec for Web Developers

A three part book series focused on lifting the security knowledge of Software Developers, Engineers, and their teams, so that they can continuously deliver secure technical solutions on time and within budget, without nasty surprises. First book is complete, second book is content complete and currently in technical review.

Workshop - Building Security Into Your Development Teams

Kim's flagship Software Developer focussed training, this time at Christchurch Hacker Conference (CHCon).

Haroon Meer on Network Security

Haroon Meer talks with Kim Carter about network security on Software Engineering Radio.

Workshop - Web Developer Quiz Night

Attacking a set of carefully curated questions around info-sec, white hat, black hat, attack and defense.