User Session Recording Technology for Security and Compliance Training Course
User session recording technology is utilized to capture, monitor, and audit user activity on IT systems, providing insights for security, compliance, and forensic investigations.
This instructor-led, live training (online or onsite) is aimed at beginner-level to intermediate-level IT and security professionals who wish to implement user session recording solutions to enhance monitoring, compliance, and accountability.
By the end of this training, participants will be able to:
- Understand the principles of user session recording.
- Deploy and configure session recording solutions.
- Analyze and audit recorded sessions for compliance.
- Integrate session recording with security monitoring systems.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction to User Session Recording
- What is session recording
- Use cases in security and compliance
- Legal and ethical considerations
Deploying Session Recording
- Architecture and deployment options
- Configuration and storage considerations
- Agent vs agentless approaches
Monitoring and Analysis
- Viewing and auditing recorded sessions
- Integrating with SIEM and monitoring tools
- Detecting insider threats and anomalies
Best Practices and Maintenance
- Data protection and privacy
- Storage and retention policies
- Ongoing monitoring and performance tuning
Summary and Next Steps
Requirements
- An understanding of IT security fundamentals
- Experience with Windows or Linux environments
- Familiarity with compliance and audit processes
Audience
- Security administrators
- Compliance officers
- IT operations teams
Need help picking the right course?
southafrica@nobleprog.co.za or +27 (0)10 005 5793
User Session Recording Technology for Security and Compliance Training Course - Enquiry
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
get to understand more about the product and some key differences between RHDS and open source OpenLDAP.
Jackie Xie - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions
Adam - Fireup.PRO
Course - Advanced Java Security
Related Courses
389 Directory Server for Administrators
14 HoursThis instructor-led live training in Kenya (online or onsite) is designed for system administrators who wish to use 389 Directory Server to configure and manage LDAP-based authentication and authorization.
Upon completion of this training, participants will be able to:
- Install and configure 389 Directory Server.
- Comprehend the features and architecture of 389 Directory Server.
- Learn how to configure the directory server via the web console and CLI.
- Set up and monitor replication to ensure high availability and load balancing.
- Manage LDAP authentication using SSSD for improved performance.
- Integrate 389 Directory Server with Microsoft Active Directory.
ABAP Secure code
14 HoursUpon completion of this training, participants will be capable of:
- Articulating the concepts of application security and common vulnerabilities
- Outlining ABAP programming best practices and the management of SY-SUBRC
- Gaining insight into injection-related vulnerabilities
- Describing security testing utilities
- Explaining the functions of ATC and CVA
Course Format
- Interactive lectures accompanied by discussions.
- Ample opportunities for exercises and practical application.
- Hands-on implementation within a live-lab environment.
Active Directory for Admins
21 HoursThis instructor-led, live training in Kenya (online or onsite) is designed for system administrators who wish to utilize Microsoft Active Directory to manage and secure data access.
By the conclusion of this training, participants will be able to:
- Set up and configure Active Directory.
- Set up a domain and define access rights of users and devices.
- Manage users and machines through Group Policies.
- Control access to file servers.
- Set up a Certificate Service and manage certificates.
- Implement and manage services such as encryption, certificates, and authentication.
Applications Security Foundation
21 HoursThis course addresses the fundamental secure coding practices essential for a wide array of web application developers. It equips students with secure programming principles by examining specific code snippets, identifying vulnerabilities, and implementing effective remediation strategies.
Participants will observe demonstrations of real-world attacks and learn how to mitigate them, thereby building confidence in enhancing the security posture of their applications.
Duration: 3 days
Target Audience: Developers seeking to expand their expertise in secure coding.
Learning Outcomes
• Upon completion, students will gain proficiency in:
• Web Application Security.
• Common Web Application Risks.
• Demo Web Application Penetration Testing.
• Data Validation.
• Authentication.
• Session Management.
• Secure SDLC.
Android Security
14 HoursAndroid serves as an open-source platform for mobile devices, including smartphones and tablets. It offers a broad range of security features designed to simplify the creation of secure software. However, it lacks certain security aspects found in other mobile platforms. This course provides a thorough examination of these features, highlighting critical gaps related to the underlying Linux environment, the file system, and general usage conditions, as well as issues concerning permissions and other Android development components.
The course outlines common security pitfalls and vulnerabilities in both native code and Java applications, offering recommendations and best practices to prevent and mitigate these risks. Many of the discussed issues are illustrated with real-life examples and case studies. Additionally, the course includes a brief overview of how to utilize security testing tools to identify security-related programming bugs.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding
- Gain knowledge of Android security solutions
- Learn to effectively utilize various security features within the Android platform
- Receive information on recent vulnerabilities in Java for Android
- Identify typical coding errors and learn strategies to avoid them
- Understand vulnerabilities associated with native code on Android
- Recognize the serious consequences of insecure buffer handling in native code
- Comprehend architectural protection techniques and their limitations
- Access resources and further reading materials on secure coding practices
Target Audience
Professionals
Network Security and Secure Communication
21 HoursBuilding a secure networked application can be challenging, even for developers who have prior experience with cryptographic building blocks like encryption and digital signatures. To help participants grasp the role and application of these cryptographic primitives, this course first establishes a solid foundation on the core requirements of secure communication: secure acknowledgment, integrity, confidentiality, remote identification, and anonymity. It also highlights common threats that compromise these requirements alongside practical, real-world solutions.
Since cryptography is a critical component of network security, the course covers essential cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement. Rather than focusing on complex mathematical theories, these concepts are explored from a developer's perspective, featuring typical use-case examples and practical considerations such as public key infrastructures. The course also introduces security protocols used across various domains of secure communication, with a detailed examination of widely adopted protocol families like IPSEC and SSL/TLS.
Common cryptographic vulnerabilities are discussed in relation to specific algorithms and protocols, including BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE, and the RSA timing attack. For each issue, practical implications and potential consequences are outlined, avoiding deep mathematical derivations.
Finally, given that XML technology is central to data exchange for networked applications, the course addresses XML security. This includes the use of XML in web services and SOAP messages, along with protective measures such as XML Signature and XML Encryption. It also covers weaknesses in these protections and XML-specific security issues, including XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Understand the requirements of secure communication
- Learn about network attacks and defenses at different OSI layers
- Have a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Get information about some recent related vulnerabilities
- Understand security concepts of Web services
- Get sources and further readings on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursOver the course of three days, this program introduces the fundamental practices for protecting C and C++ code from malicious exploitation. It addresses common vulnerabilities arising from memory management and input handling, while also emphasizing the core principles of writing secure software.
Advanced Java Security
21 HoursEven seasoned Java developers often do not fully master the diverse security services provided by Java, nor are they always aware of the various vulnerabilities that impact web applications built with Java.
In addition to introducing the security components of Standard Java Edition, this course addresses security concerns within Java Enterprise Edition (JEE) and web services. The discussion of specific services begins with the fundamentals of cryptography and secure communication. Participants will explore declarative and programmatic security techniques in JEE through various exercises, while also examining both transport-layer and end-to-end security for web services. Practical exercises allow participants to apply these APIs and tools, providing hands-on experience with all discussed components.
The course also covers and explains the most common and severe programming flaws associated with the Java language and platform, as well as web-related vulnerabilities. Beyond typical bugs committed by Java developers, the security vulnerabilities addressed include both language-specific issues and problems arising from the runtime environment. All vulnerabilities and corresponding attacks are demonstrated through clear, understandable exercises, followed by recommended coding guidelines and potential mitigation strategies.
Participants attending this course will
- Understand the fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and how to avoid them
- Understand the security concepts of web services
- Learn to utilize various security features within the Java development environment
- Gain a practical understanding of cryptography
- Understand the security solutions offered by Java EE
- Learn about typical coding mistakes and how to prevent them
- Gain information on recent vulnerabilities in the Java framework
- Acquire practical knowledge in using security testing tools
- Receive resources and further reading materials on secure coding practices
Audience
Developers
Standard Java Security: Secure Coding & Development Practices
14 HoursDescription
Although the Java language and the Java Runtime Environment (JRE) were engineered to minimize the common security vulnerabilities often found in other languages like C/C++, developers and architects must do more than just leverage the environment's positive security features. They must also recognize the persistent 'negative security' vulnerabilities that remain relevant to Java development.
This course begins with a concise overview of cryptographic foundations, establishing a common baseline for understanding the purpose and operation of applicable security components. Participants will then apply these concepts through practical exercises, allowing them to experiment with the discussed APIs firsthand.
Additionally, the curriculum examines the most frequent and severe programming flaws inherent to the Java language and platform. This includes addressing typical mistakes made by Java programmers as well as issues specific to the language and environment. All vulnerabilities and associated attack vectors are demonstrated through easy-to-understand exercises, followed by recommended coding guidelines and effective mitigation techniques.
Participants attending this course will
- Gain a solid understanding of fundamental security concepts, IT security, and secure coding principles
- Identify Web vulnerabilities beyond the OWASP Top Ten and learn how to prevent them
- Master the use of various security features within the Java development environment
- Develop a practical understanding of cryptography
- Recognize common coding mistakes and learn strategies to avoid them
- Stay informed about recent vulnerabilities in the Java framework
- Access sources and further reading materials on secure coding practices
Audience
Developers
FreeIPA for Administrators
14 HoursThis instructor-led, live training in Kenya (online or onsite) is designed for system administrators who want to leverage FreeIPA to centralize authentication, authorization, and account data for their organization's users, groups, and machines.
By the end of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single central location.
- Utilize FreeIPA's CLI, Web UI, and RPC interface to set up and manage permissions.
- Enable Single Sign-On authentication across all systems, services, and applications.
- Integrate FreeIPA with Windows Active Directory.
- Backup, replicate, and migrate a FreeIPA server.
Identity and Access Management with Okta
14 HoursThis instructor-led, live training in Kenya (available online or onsite) is designed for system administrators who aim to utilize Okta for identity and access management.
By the end of this training, participants will be able to:
- Configure, integrate, and manage Okta.
- Integrate Okta into an existing application.
- Implement security with multi-factor authentication.
OpenLDAP Workshop
21 HoursThis instructor-led, live training in Kenya (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP.
By the end of this training, participants will be able to:
- Understand the structure and operation of LDAP directories.
- Install and configure OpenLDAP for various deployment environments.
- Implement access control, authentication, and replication mechanisms.
- Use OpenLDAP with third-party services and applications.
Identity and Access Management using OpenAM
14 HoursThis instructor-led, live training in Kenya (online or onsite) is aimed at system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
- Set up the necessary server environment to start configuring authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
- Use federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to extend identity management securely across different systems or applications.
- Access and manage authentication, authorization, and identity services through REST APIs.
OpenDJ for Administrators
14 HoursThis instructor-led, live training in Kenya (online or onsite) is aimed at system administrators who wish to use OpenDJ to manage their organization's user credentials in a production environment.
By the end of this training, participants will be able to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server, including monitoring, troubleshooting, and optimizing for performance.
- Create and manage multiple OpenDJ databases.
- Backup and migrate an OpenDJ server.