Best Practices Modules

Efficient Training Reinforcement

Studies have shown that the best way to change behavior is to reinforce specific behavior change topics on a regular basis. A core component of GLS’s Human Firewall solution includes powerful, topic-specific modular training to enhance your training program.

You’re thinking, “who has time for another 20- to 40-minute course?” That’s why we offer short 5- to 7-minute, scenario-based modules on key security topics like passwords, social engineering, avoiding phishing threats, ransomware and more. Our suite of cybersecurity best practices modules helps drive higher employee knowledge retention with shorter, topic-specific training.

Fast, Effective Modules

hands on keyboards representing cybersecurity best practices modules

Employees – including those in key job roles managing sensitive data and information and targeted by cybercriminals – are able to receive the just-in-time training needed to reinforce critical training topics, which in turn fosters the behavior needed to reduce risk in your organization.

Featured Module

Business Email Compromise (BEC)

Business Email Compromise is one of the most insidious and financially damaging online crimes, scamming roughly three times as many organizations as malware and slightly more than spear phishing. Because of this, we have created two outstanding segments on BEC: Best Practices Module: Avoiding Business Email Compromise and a Shock and Awareness Video Module: Business Email Compromise. This is such an important topic that we recommend it be taught to all employees.

Our suite of cybersecurity best practices modules provides

Results

Following industry best practices for data protection and data privacy ensures your organization is compliant and can prove secure handling is in place when asked or audited.

Engaging Content

A successful training program that allows employees to sharpen their skills one topic at a time in a condensed training format. An enjoyable video sticks longer than a two-hour lecture.

Return On investment

Employees with a solidified understanding of their value to your company’s safety and survival. A knowing staff can save you ample money and time.

Results

Following industry best practices for data protection and data privacy ensures your organization is compliant and can prove secure handling is in place when asked or audited.

Engaging Content

A successful training program that allows employees to sharpen their skills one topic at a time in a condensed training format. An enjoyable video sticks longer than a two-hour lecture.

Return On investment

Employees with a solidified understanding of their value to your company’s safety and survival. A knowing staff can save you ample money and time.

View Our
Course Catalog

Fill out the form below to contact us!

*
*
*
*
*
*
*
*
*
GLS Logo
Front-End Exercises
React Angular Vue.js
Cross Site Request Forgery Cross Site Request Forgery Untrusted HTML Rendering XSS
Direct Dom Manipulation XSS Direct Dom Manipulation XSS Direct Dom Manipulation XSS
Components with Known Vulnerabilities Template Concatenation Cross Site Request Forgery
Untrusted HTML Rendering XSS Sanitization Misuse XSS Untrusted Template Usage XSS
GLS Logo
OWASP Top 10 – API – 2019
ID Topic Covered in SecureDev Modules Programming Languages Available
API1:2019 Broken Object Level Authorization Broken Object Level Authorization JAVA, C#, Python (Django), Python (Flask), Node.js, GO, PHP, Ruby on Rails, Scala, Kotlin
API2:2019 Broken User Authentication Broken User Authentication
API3:2019 Excessive Data Exposure Excessive Data Exposure
API4:2019 Lack of Resources & Rate Limiting Lack of Resources & Rate Limiting
API5:2019 Broken Function Level Authorization Broken Function Level Authorization
API6:2019 Mass Assignment Mass Assignment
API7:2019 Security Misconfiguration Security Misconfiguration
API8:2019 Injection Injection
API9:2019 Improper Assets Management Improper Assets Management
API10:2019 Insufficient Logging & Monitoring Insufficient Logging & Monitoring
GLS Logo
OWASP Top 10 – 2021
ID Topic Covered in SecureDev Modules Programming Languages Available
A01:2021 Broken Access Control Vertical Privilege Escalation Horizontal Privilege Escalation JAVA, C#, Python (Django), Python (Flask), Node.js, GO, PHP, Ruby on Rails, Scala, Kotlin
A02:2021 Cryptographic Failures Weak Randomness
A03:2021 Injection SQL Injection Command Injection Header Injection XML Injection
A04:2021 Insecure Design User Enumeration
A05:2021 Security Misconfiguration Leftover Debug Code
A06:2021 Broken Access Control Vertical Privilege Escalation Horizontal Privilege Escalation
A07:2021 Vulnerable and Outdated Components Session Fixation Forced Browsing
A08:2021 Software and Data Integrity Failures Reflected XSS
Forced Browsing
Stored Cross-Site Scripting
Insecure URL Redirect
Clickjacking
Directory Traversal
DOM XSS
Cross-site Request Forgery
A09:2021 Security Logging and Monitoring Failures PII Data in URL
Token Exposure in URL
A10:2021 Server-Side Request Forgery (SSRF) Server-Side Request Forgery
GLS Logo

Your download is complete!

Need more training?