Course curriculum

    1. Course Overview and Objectives

    2. Importance of Secure Design in Software Development

    1. Understanding Threat Models

    2. Security Patterns and Best Practices

    1. Securing a Login Flow - TOTP and its weaknesses

    2. Problems with Two Factor Authentication

    3. Building a Phishing resistant authentication system - WebAuthn

    4. What to use when MFA isn’t an option

    5. Attack protection capabilities

    1. Designing User Authentication for TV-Based Systems

    2. TV Interface Security Considerations

    1. Implementing Passwordless logins using Passkey, WebAuthn protocols

    1. Introduction to End-to-End Encryption

    2. Key exchange and message encryption processes

    3. Strategies for mitigating risks and ensuring robust security measures

About this course

  • $599.00
  • 22 lessons
  • 0 hours of video content

Instructor(s)

Harish Ramadoss

Harish Ramadoss has several years of expertise in Product Security, Red Teaming, and Security Research.

Previously, he was a Principal at Trustwave SpiderLabs, where he led their Application Security efforts. He later joined Rippling as a founding member of the Security Engineering team and currently leads their AI Security and Application Security initiatives.

Harish built DejaVu, an open-source deception platform, and runs AI Security training at NorthSec.

He has presented at leading security conferences including Black Hat, DEF CON, HITB, and other conferences worldwide.

Our courses are set to launch soon!

Add your email to the mailing list to get the latest updates.

Thank You