From introductory cryptography concepts to practical cryptography use, our trainings are personalized to your goals. Cryptography can be intimidating and can seem complicated, but we break it down in a way that makes it approachable and actionable.
Data security crosses paths with many other disciplines, and is critical to protecting both your business' crown-jewels and your clients' personal information. There are many aspects to data security, and our training will prepare you to architect data-protective solutions.
We have proven that high quality source code review starts with strong engineering foundations, giving us the ability to engineer mental models and provide effective analysis. We present important outcomes of source code reviews and the implications they have in litigation.