The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA’s Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instructors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You’ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.
Date | Time | Price | Option |
---|---|---|---|
04/16/2025 | 08:00 AM - 04:00 PM CT | $2,195.00 | |
06/18/2025 | 08:00 AM - 04:00 PM CT | $2,195.00 | |
08/20/2025 | 08:00 AM - 04:00 PM CT | $2,195.00 | |
10/22/2025 | 08:00 AM - 04:00 PM CT | $2,195.00 | |
12/03/2025 | 09:00 AM - 05:00 PM CT | $2,195.00 |
Course Topics / Agenda
Session: STIG Foundation
Lesson: DISA’s Security Technical Implementation Guides (STIGs)
Lesson: Why Hunt Bugs?
Session: Foundation for Securing Web Applications
Lesson: Identification and Authentication Failures
Lesson: Injection
Lesson: Database Security
Session: Moving Forward
Lesson: Applications: What Next?
Lesson: Cryptographic Failures
Session: Moving Forward with Application Security
Lesson: Application Security and Development Checklists
Time Permitting
Session: Secure Development Lifecycle (SDL)
Lesson: Principles of Information Security
Learning Objectives
Working in an interactive learning environment, guided by our application security expert, you’ll explore:
Need different skills or topics? We offer additional cybersecurity, application security and other related topics that may be blended with this course for a track that best suits your needs. Our team will collaborate with you to understand your needs and will target the course to focus on your specific learning objectives and goals.
The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as:
While specific prerequisites may vary depending on the course provider and the targeted audience, a general set of prerequisites for attending a course on Information Assurance and STIGs could include: