Team Professor™ e-Learning

A comprehensive approach to
delivering offensive and defensive skills.

The Industry's Largest and Most Comprehensive Application Security e-Learning Library

For Software Development Teams TEAM Professor™ is the e-Learning part of our TEAM Academy solution. With 120+ courses, it provides your software development teams with computer-based training that encompasses the latest industry best practices.

Our dynamic curriculum will improve your developers' security knowledge, and help you comply with the latest standards that mandate application security training and the use of secure coding best practices.

TEAM Professor™ is scalable for enterprise deployment, and is self-paced so that your developers can easily manage their learning experience. Request a free demonstration to see the content, design, and the level of interactivity we build into our courses.

About TEAM Professor™

TEAM Professor™ e-Learning classes combine expert content and voiceovers with hands-on exercises to maximise knowledge transferred to your developers. The content is based on instructor-led courses that our experts have developed and refined with years of "in the trenches" experience.

Developed by a combination of security engineers and training experts, the courses ensure that new skills are taught effectively. Our modules include questions that involve your developers and promote critical thinking, without impacting flow.

TEAM Professor™ combines progressive role, platform teamprofessorand technology courses. With over 120+ Courses comprising of foundation to advanced level courses, delivers the right level of training at the right time, to suit the tagetted skill and knowledge level required.

Courses:

BY ROLE

Manager, Architect, Developer, Test/QA

BY PLATFORM

Mobile, Android, iOS, Database, Oracle, SQL, SAP, Cloud, Azure, AWS, Embedded, Windows

BY TECHNOLOGY

.NET, C#, Java, PHP, C/C++, Objective-C, Web 2.0, AJAX, HTML 5.0

e-Learning classes include hands-on simulations and labs that allow your development teams to apply the concepts they learn and ensure understanding of how to apply and integrate newly acquired knowledge into daily work activities. While these hands-on exercises are very interactive, students are guided by the course to ensure they learn in the most time-effective manner.

Each course is tied into the phases of the Software Development Lifecycle and provides the knowledge that your Software Development teams need to:

  • Integrate application security into overall staff awareness training
  • Expose dangerous security holes before your applications are released
  • Develop more secure code
  • Roll out secure development best practices
  • Understand the myriad of security breaches and threats your organisation faces

The e-Learning Approach

Security Innovation's e-Learning methodology is based on the ADDIE model: an instructional design process that includes five separate phases:

  • Analysis: Instructional goals, objectives and prerequisite knowledge of the course are identified.
  • Design: The course's learning or performance objectives are refined and an instructional, visual and technical design strategy is developed, based on learning objectives. Each type of training activity is selected to maximize the success of achieving predefined learning objectives.
  • Development: Course storyboards are developed. Visual and audio-based activities are specified (animations, videos, simulations, voiceovers, games).
  • Implementation: Visual and audio-based activities are created. All course artifacts are integrated into the release candidate.
  • Evaluation: The course is tested and refined through a rigorous quality assurance process.

All learning activities included in Security Innovation's e-Learning courses fall in one of the following three categories: Absorb, Do or Connect. The aim of this approach is to put your developer into action: elevating learning from passive reading & watching to actively seeking, selecting and experiencing the material to acquire new knowledge and skills. These activity categories are as follows:

  • Absorb activities enable your teams to obtain the crucial, up-to-date information they need to do their jobs or further their learning. They are activities that require learners to read (text), watch (video), and listen (narration) to absorb the information, e.g.: an animation with voiceover.
  • Do activities are those aimed at transforming newly absorbed information into knowledge and skills. "Do" activites include, games, case-studies, quizzes, and matching.
  • Connect activities are designed to link the information provided in the course to your developers' work environment and everyday lives. They usually come in the form of a set of questions that relate acquired knowledge to their day-to-day roles.

Absorb activities are the nouns, do activities the verbs, and connect activities the conjunctions of learning. Security Innovation uses a team of instructional designers, programmers, and graphic designers working together to maximise knowledge transfer, and select the right combination of activities to ensure that all types of learner are engaged.

Additionally, our courses involve a lot of interactive activities ranging from Level 1 (passive) to Level 3 (complex interaction); we aim to include as many complex interactions as possible when the topic warrants it. These levels of interactivity are based on the scale defined by the U.S. Department of Defense. All of our eLearning classes are SCORM and AICC compliant. Many of our courses qualify for CPE credits for CISSP and CSSLP.

Ready to become a master
of your cyber security universe?

Book a free consultation and one of our experts will be in touch to learn more about your current situation, and discuss how we could help.

Master data security