Course curriculum

    1. Course Overview and Objectives

    2. Importance of Secure Design in Software Development

    1. Understanding Threat Models

    2. Security Patterns and Best Practices

    1. Securing a Login Flow - TOTP and its weaknesses

    2. Problems with Two Factor Authentication

    3. Building a Phishing resistant authentication system - WebAuthn

    4. What to use when MFA isn’t an option

    5. Attack protection capabilities

    1. Designing User Authentication for TV-Based Systems

    2. TV Interface Security Considerations

    1. Implementing Passwordless logins using Passkey, WebAuthn protocols

    1. Introduction to End-to-End Encryption

    2. Key exchange and message encryption processes

    3. Strategies for mitigating risks and ensuring robust security measures

About this course

  • $599.00
  • 22 lessons
  • 0 hours of video content

Instructor(s)

Harish Ramadoss

Harish Ramadoss is an experienced Cybersecurity Professional with a Software Engineering background and has several years of expertise in Product Security, Red Teaming, and Security Research. Co-Founder of Camolabs.io where they built open-source deception platform. In the past has presented at Blackhat, Defcon, HITB and few other conferences globally.

Our courses are set to launch soon!

Add your email to the mailing list to get the latest updates.

Thank You