EVERYONE has a role to play in preventing cyberattacks.

Techguard Shield logo

Enable your “human firewall” with our award-winning S.H.I.E.L.D. Cybersecurity Awareness Training. Read More

Search Courses

 
 
 
Reset

Improper Error Handling

Errors are a fact of life in any system. But what happens when an error report ends up revealing a weakness? Take a closer look at the problem of improper error handling. 3:26 minutes

Acceptable Use Policy

When you start a new job or enroll in a new school, you’ll often be asked to review and sign an Acceptable Use Policy for the network. Let’s take a quick look at the purpose and contents of an AUP.

4:39 minutes

Buffer Overflow

This module discusses the risks caused by buffer overflows and how to avoid them.

2:56 minutes

XML External Entitites (XXE)

This lesson covers how XXE attacks are executed, and how to prevent those attacks on your applications. 3:24 minutes

Insecure Deserialization

This module covers best practices for serialization - the process of turning data objects into binary streams of data. 4:06 minutes

Suspicious Hosts

Suspicious hosts are known malicious or potentially unsafe IP addresses or hostnames. This module will show how safe browsing can protect Internet users from malicious attacks from suspicious hosts. 3:50 minutes

Newsletter

Get all the latest TechGuard Updates!

Trending Courses
Most Popular Courses
Recently Added Courses

Are you ready?

Take the next steps

Reach out to one of our cybersecurity experts today.

Get Started