Visit Security Journey

Post listing page

Topic: Offensive Training

Application Security offensive training definitions

Finding Vulnerabilities:  Differences among Vulnerability Scanning, Pen Testing, Bug Bounty, Red Team and Purple Team Compared

  When designing systems to be impervious to outside activity, you should always aim to be at least two steps ahead of your adversaries. Whatever it is that you want to protect, whether...

Continue Reading

offensive training ctf

What is a Capture The Flag Event, and How Does It Benefit Developers?

What is a CTF? A Capture the Flag event, or CTF for short, is a gamified exercise designed to test cybersecurity skills. The goal of the game, much like in the live-action, outdoor game...

Continue Reading

Secure Coding Training defensive training offensive training

How Offensive Training Improves Defensive-Only Approaches in Secure Coding Training

  “I used to attack because it was the only thing I knew. Now I attack because I know it works best.” - Garry Kasparov, chess legend   Chess is an oft-used analogy for cybersecurity...

Continue Reading