User Session Recording Technology for Security and Compliance Training Course
User session recording technology enables the capture, monitoring, and auditing of user activities within IT systems, offering critical insights for security enforcement, regulatory compliance, and forensic analysis.
This instructor-led live training, available online or onsite, is designed for beginner to intermediate-level IT and security professionals aiming to implement user session recording solutions to improve monitoring capabilities, ensure compliance, and strengthen accountability.
Upon completion of this training, participants will be equipped to:
- Grasp the fundamental principles of user session recording.
- Deploy and configure session recording solutions.
- Analyze and audit recorded sessions to ensure compliance.
- Integrate session recording with existing security monitoring systems.
Format of the Course
- Interactive lectures and discussions.
- Extensive exercises and practical practice.
- Hands-on implementation within a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange details.
Course Outline
Introduction to User Session Recording
- Understanding session recording
- Use cases in security and compliance
- Legal and ethical considerations
Deploying Session Recording
- Architecture and deployment options
- Configuration and storage considerations
- Agent versus agentless approaches
Monitoring and Analysis
- Viewing and auditing recorded sessions
- Integrating with SIEM and monitoring tools
- Detecting insider threats and anomalies
Best Practices and Maintenance
- Data protection and privacy
- Storage and retention policies
- Ongoing monitoring and performance tuning
Summary and Next Steps
Requirements
- Knowledge of IT security fundamentals
- Experience with Windows or Linux environments
- Familiarity with compliance and audit processes
Audience
- Security administrators
- Compliance officers
- IT operations teams
Open Training Courses require 5+ participants.
User Session Recording Technology for Security and Compliance Training Course - Booking
User Session Recording Technology for Security and Compliance Training Course - Enquiry
User Session Recording Technology for Security and Compliance - Consultancy Enquiry
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
get to understand more about the product and some key differences between RHDS and open source OpenLDAP.
Jackie Xie - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions
Adam - Fireup.PRO
Course - Advanced Java Security
Upcoming Courses
Related Courses
389 Directory Server for Administrators
14 HoursThis instructor-led, live training in Malaysia (online or onsite) is designed for system administrators who wish to use 389 Directory Server to configure and manage LDAP-based authentication and authorisation.
Upon completing this training, participants will be able to:
- Install and configure 389 Directory Server.
- Understand the features and architecture of 389 Directory Server.
- Learn how to configure the directory server using the web console and CLI.
- Set up and monitor replication for high availability and load balancing.
- Manage LDAP authentication using SSSD for faster performance.
- Integrate 389 Directory Server with Microsoft Active Directory.
Active Directory for Admins
21 HoursThis instructor-led, live training in Malaysia (online or onsite) is designed for system administrators who want to use Microsoft Active Directory to manage and secure data access.
By the end of this training, participants will be able to:
- Set up and configure Active Directory.
- Create a domain and define access rights for users and devices.
- Manage users and machines through Group Policies.
- Control access to file servers.
- Set up a Certificate Service and manage certificates.
- Implement and manage services such as encryption, certificates, and authentication.
Android Security
14 HoursAndroid serves as an open-source platform for mobile devices, including smartphones and tablets. It offers a wide array of security features designed to facilitate the development of secure software. Nevertheless, it lacks certain security elements found on other mobile platforms. This course provides a thorough examination of these features and highlights critical gaps associated with the underlying Linux system, file structure, and general environment, as well as issues related to permission management and other Android development components.
The course details common security pitfalls and vulnerabilities for both native code and Java applications, offering recommendations and best practices to prevent and mitigate these risks. Many of the discussed issues are illustrated with real-world examples and case studies. Additionally, the course covers how to utilise security testing tools to identify potential programming flaws related to security.
Participants attending this course will
- Gain a solid understanding of fundamental security principles, IT security, and secure coding techniques
- Learn about the security solutions available on Android
- Master the use of various Android platform security features
- Receive updates on recent Java vulnerabilities within the Android environment
- Identify common coding errors and learn how to avoid them
- Understand vulnerabilities associated with native code on Android
- Recognise the serious implications of insecure buffer handling in native code
- Comprehend architectural protection mechanisms and their limitations
- Access resources and further reading on secure coding practices
Audience
Professionals
Network Security and Secure Communication
21 HoursDeveloping secure networked applications can be challenging, even for developers who have previously utilized various cryptographic building blocks, such as encryption and digital signatures. To help participants grasp the role and application of these cryptographic primitives, the course begins by establishing a solid foundation regarding the core requirements of secure communication: secure acknowledgement, integrity, confidentiality, remote identification, and anonymity. It also addresses typical threats that may compromise these requirements, alongside real-world solutions.
As cryptography is a critical aspect of network security, the course covers the most important algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement. Rather than focusing on complex mathematical theory, these topics are presented from a developer's perspective, illustrating typical use-case examples and practical considerations, such as the implementation of public key infrastructures. Additionally, security protocols used in various areas of secure communication are introduced, with an in-depth discussion on widely-used protocol families like IPSEC and SSL/TLS.
Common cryptographic vulnerabilities are examined, covering issues related to specific algorithms and protocols such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE, and RSA timing attacks. For each problem, practical considerations and potential consequences are described without delving into deep mathematical details.
Finally, since XML technology is central to data exchange for networked applications, the security aspects of XML are detailed. This includes the use of XML in web services and SOAP messages, along with protection mechanisms like XML Signature and XML Encryption. The course also covers weaknesses in these protection measures and XML-specific security issues such as XML injection, XML External Entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Grasp the requirements of secure communication
- Learn about network attacks and defenses across different OSI layers
- Develop a practical understanding of cryptography
- Understand essential security protocols
- Comprehend recent attacks against cryptosystems
- Gain information on recent related vulnerabilities
- Understand security concepts of Web services
- Access sources and further readings on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursSpanning three days, this course explores the foundational principles of securing C/C++ code. Participants will learn how to protect against malicious exploitation of common vulnerabilities, particularly those arising from memory management and input handling.
Advanced Java Security
21 HoursEven seasoned Java developers often do not fully master the array of security services provided by Java, nor are they always aware of the distinct vulnerabilities that affect web applications built with Java.
This course not only introduces the security components of the Standard Java Edition but also addresses security challenges within the Java Enterprise Edition (JEE) and web services. The discussion of specific services begins with the fundamental principles of cryptography and secure communication. A series of practical exercises covers both declarative and programmatic security techniques in JEE, while the course explores transport-layer and end-to-end security for web services. Participants will engage in several hands-on exercises to apply and experiment with the discussed APIs and tools.
The course also examines and clarifies the most common and severe programming flaws associated with the Java language and platform, along with web-related vulnerabilities. Beyond typical bugs made by Java programmers, the security vulnerabilities covered include issues specific to the language and those arising from the runtime environment. Each vulnerability and its corresponding attack vector are demonstrated through clear, easy-to-follow exercises, followed by recommended coding guidelines and potential mitigation strategies.
Participants attending this course will
- Grasp the fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and understand how to prevent them
- Understand the security principles underlying web services
- Acquire the skills to utilise various security features within the Java development environment
- Develop a practical understanding of cryptography
- Comprehend the security solutions provided by Java EE
- Learn to identify typical coding mistakes and how to avoid them
- Gain insights into some recent vulnerabilities within the Java framework
- Obtain practical experience in using security testing tools
- Access resources and further reading materials on secure coding practices
Audience
Developers
Standard Java Security: Secure Coding & Development Practices
14 HoursDescription
While the Java language and Java Runtime Environment (JRE) were engineered to be free from many of the common, severe security vulnerabilities often found in languages like C/C++, developers and architects must possess more than just a knowledge of Java's positive security features. They must also be vigilant about the numerous vulnerabilities that remain pertinent to Java development, a concept referred to as 'negative security'.
The course introduces security services by first providing a concise overview of cryptography foundations, establishing a shared baseline for understanding the purpose and function of the relevant components. Participants will engage in several practical exercises to apply these concepts using the discussed APIs.
Additionally, the course examines and explains the most frequent and critical programming flaws within the Java language and platform. This includes both common errors made by Java programmers and issues specific to the language and its environment. All vulnerabilities and associated attacks are demonstrated through clear, understandable exercises, followed by recommended coding guidelines and mitigation strategies.
Participants attending this course will
- Grasp the fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and understand how to prevent them
- Gain the skills to utilize various security features within the Java development environment
- Develop a practical understanding of cryptography
- Identify typical coding mistakes and learn how to avoid them
- Receive information regarding recent vulnerabilities within the Java framework
- Access sources and further reading materials on secure coding practices
Audience
Developers
.NET, C# and ASP.NET Security Development
14 HoursToday, numerous programming languages can compile code for the .NET and ASP.NET frameworks. While this environment offers robust capabilities for security development, it is essential for developers to understand how to apply programming techniques at both the architecture and coding levels. This knowledge allows them to implement necessary security functions while avoiding vulnerabilities or minimizing their potential impact.
This course aims to equip developers with practical skills through extensive hands-on exercises. Participants will learn to prevent untrusted code from executing privileged actions, safeguard resources via strong authentication and authorization mechanisms, facilitate remote procedure calls, manage sessions effectively, and explore various implementations for specific functionalities.
The discussion on vulnerabilities begins by highlighting typical programming errors associated with .NET. The analysis of ASP.NET vulnerabilities further examines various environment settings and their implications. Additionally, the section on ASP.NET-specific vulnerabilities addresses general web application security challenges as well as unique issues and attack vectors, such as ViewState attacks and string termination exploits.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding practices
- Understand web vulnerabilities beyond the OWASP Top Ten and learn how to mitigate them
- Master the use of various security features within the .NET development environment
- Gain practical expertise in utilizing security testing tools
- Identify common coding mistakes and learn strategies to avoid them
- Stay informed about recent vulnerabilities affecting .NET and ASP.NET
- Access resources and recommended reading materials on secure coding practices
Audience
Developers
The Secure Coding Landscape
14 HoursThis course provides an introduction to fundamental security principles, offering a broad perspective on vulnerability types across different programming languages and platforms. It outlines strategies for managing software security risks throughout all stages of the software development lifecycle. While avoiding deep technical complexities, the course highlights prominent and impactful vulnerabilities prevalent in modern software development technologies. It also addresses the challenges of security testing and introduces practical techniques and tools to help participants identify and resolve existing issues in their code.
Upon completion of this course, participants will
- Grasp the core concepts of security, IT security, and secure coding practices
- Comprehend web vulnerabilities affecting both server and client sides
- Recognize the serious implications of improper buffer handling
- Gain awareness of recent vulnerabilities found in development environments and frameworks
- Learn about common coding errors and methods to prevent them
- Understand various security testing approaches and methodologies
Intended Audience
Managers
FreeIPA for Administrators
14 HoursThis instructor-led live training in Malaysia (online or onsite) is designed for system administrators who wish to use FreeIPA to centralise authentication, authorisation, and account information for their organisation’s users, groups, and machines.
By the end of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single central location.
- Use FreeIPA's CLI, Web UI and RPC interface to set up and manage permissions.
- Enable Single Sign On authentication across all systems, services and applications.
- Integrate FreeIPA with Windows Active Directory.
- Backup, replicate and migrate an FreeIPA server.
Identity and Access Management with Okta
14 HoursThis instructor-led, live training in Malaysia (online or onsite) is tailored for system administrators who wish to utilise Okta for identity and access management.
By the end of this training, participants will be able to:
- Configure, integrate, and manage Okta.
- Integrate Okta into existing applications.
- Implement security using multi-factor authentication.
OpenLDAP Workshop
21 HoursThis instructor-led, live training in Malaysia (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP.
By the end of this training, participants will be able to:
- Understand the structure and operation of LDAP directories.
- Install and configure OpenLDAP for various deployment environments.
- Implement access control, authentication, and replication mechanisms.
- Use OpenLDAP with third-party services and applications.
Identity and Access Management using OpenAM
14 HoursThis instructor-led, live training in Malaysia (online or onsite) is designed for system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
- Set up the necessary server environment to begin configuring authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
- Utilise federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to extend identity management securely across different systems or applications.
- Access and manage authentication, authorisation, and identity services through REST APIs.
OpenDJ for Administrators
14 HoursThis instructor-led, live training in Malaysia (online or onsite) targets system administrators aiming to use OpenDJ for managing organizational user credentials in a production environment.
Upon completion of this training, participants will be able to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server, including monitoring, troubleshooting, and optimizing for performance.
- Create and manage multiple OpenDJ databases.
- Backup and migrate an OpenDJ server.