FlexNet Administration Training Course
FlexNet, developed by Flexera Software, is a comprehensive system for software licensing and compliance management. It offers robust tools for activating software, generating license keys, and tracking software usage.
This instructor-led, live training session (available online or onsite) is designed for system administrators looking to master the basics of software licensing, explore FlexNet’s key features, and learn how to deploy and sustain software license management solutions.
Upon completing this training, participants will be equipped to:
- Grasp the core principles of software licensing.
- Administer the primary components and operational systems of FlexNet.
- Develop various license models and types, generate keys, and activate software licenses for end-users.
- Assign, oversee, and distribute licenses to users, track usage patterns, and maintain compliance.
Course Format
- Engaging lectures and group discussions.
- Extensive exercises and practical application.
- Hands-on implementation within a live-lab environment.
Customization Options
- For tailored training requests, please get in touch with us to coordinate.
Course Outline
Introduction
- Exploring software licensing concepts
- Overview of the FlexNet licensing system
- The benefits and significance of effective license management
FlexNet Components and Architecture
- Key components of the FlexNet licensing system
- Understanding the FlexNet licensing server
- Structure and content of license files
Installation and Configuration
- Installing FlexNet licensing components
- Configuring the licensing server
- Managing server options and settings
License Creation and Activation
- Developing different license models and types
- Features and applications of various license types
- License key generation and activation
- Implementing software activation mechanisms
User and License Management
- Adding and managing end-users
- Entitlements and user administration
- Allocating and revoking licenses
- Monitoring license usage and ensuring compliance
Reporting and Monitoring
- Generating license usage reports
- Monitoring license server activity
- Setting up alerts and notifications for effective license management
Advanced Topics
- Integrating FlexNet operations web services
- High availability and redundancy in license servers
- License borrowing and offline usage
- Maintenance
- Troubleshooting and handling license server errors
- Best practices for error resolution
Best Practices and Security
- Security considerations in license management
- Backup and disaster recovery strategies
- Compliance and audit preparation
- Incorporating best practices for efficient license management
Summary and Next Steps
Requirements
- Fundamental understanding of software and IT concepts
Target Audience
- System administrators
- IT professionals
Open Training Courses require 5+ participants.
FlexNet Administration Training Course - Booking
FlexNet Administration Training Course - Enquiry
FlexNet Administration - Consultancy Enquiry
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions
Adam - Fireup.PRO
Course - Advanced Java Security
The topic is current and I needed to be updated
Damilano Marco - SIAP s.r.l.
Course - Secure Developer Java (Inc OWASP)
Upcoming Courses
Related Courses
Android Security
14 HoursAndroid serves as an open platform for mobile devices, including smartphones and tablets. While it offers a wide range of security features designed to simplify the creation of secure software, it also lacks certain security aspects found in other handheld platforms. This course provides a comprehensive examination of these features, highlighting the most critical shortcomings related to the underlying Linux system, the file structure, and the general environment, as well as issues concerning permissions and other Android software development components.
The course describes common security pitfalls and vulnerabilities in both native code and Java applications, offering recommendations and best practices to prevent and mitigate them. Many of the discussed issues are illustrated with real-life examples and case studies. Finally, we provide a brief overview of how to utilize security testing tools to identify potential security-related programming errors.
Participants attending this course will
- Gain a solid understanding of the fundamental concepts of security, IT security, and secure coding
- Learn about the security solutions available on Android
- Acquire the skills to utilize various security features of the Android platform
- Receive information on recent Java vulnerabilities within the Android environment
- Understand typical coding errors and learn how to avoid them
- Develop an understanding of native code vulnerabilities on Android
- Recognize the serious consequences of insecure buffer handling in native code
- Comprehend architectural protection techniques and their limitations
- Access resources and further reading materials on secure coding practices
Target Audience
Professionals
Network Security and Secure Communication
21 HoursImplementing a secure networked application can be challenging, even for developers who have prior experience with various cryptographic building blocks (such as encryption and digital signatures). To ensure participants grasp the role and application of these cryptographic primitives, the course begins by establishing a solid foundation on the core requirements of secure communication – including secure acknowledgment, integrity, confidentiality, remote identification, and anonymity. It also highlights typical issues that can compromise these requirements alongside real-world solutions.
Since cryptography is a critical aspect of network security, the course covers the most important algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement. Rather than focusing on in-depth mathematical theory, these topics are explored from a developer's perspective, featuring typical use-case examples and practical considerations such as public key infrastructures. Security protocols used in various aspects of secure communication are introduced, with a detailed discussion on widely adopted protocol families like IPSEC and SSL/TLS.
The course examines typical cryptographic vulnerabilities associated with specific algorithms and protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE, and RSA timing attacks. For each issue, practical considerations and potential consequences are described, avoiding deep mathematical details.
Finally, as XML technology is central to data exchange in networked applications, the course describes its security aspects. This includes using XML within web services and SOAP messages, along with protection measures like XML signature and XML encryption. It also addresses weaknesses in these protection measures and XML-specific security issues such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Understand the requirements of secure communication
- Learn about network attacks and defenses across different OSI layers
- Gain a practical understanding of cryptography
- Understand essential security protocols
- Understand recent attacks against cryptosystems
- Gain information about some recent related vulnerabilities
- Understand security concepts of Web services
- Get sources and further readings on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursOver the course of three days, this training program delves into the foundational aspects of protecting C/C++ code from malicious actors who seek to exploit vulnerabilities arising from poor memory management and inadequate input handling. The course focuses on the core principles necessary for writing secure, resilient code.
Advanced Java Security
21 HoursEven seasoned Java developers often struggle to fully grasp the breadth of security services provided by Java, nor do they always recognize the diverse vulnerabilities that impact web applications built with Java.
This course goes beyond introducing the security components of Standard Java Edition to address security concerns within Java Enterprise Edition (JEE) and web services. The discussion begins with the fundamentals of cryptography and secure communication before diving into specific services. Participants will engage in various exercises focused on both declarative and programmatic security techniques in JEE, as well as explore transport-layer and end-to-end security for web services. Through hands-on practical exercises, attendees will actively experiment with the APIs and tools covered, gaining direct experience with their application.
The course also thoroughly examines and explains the most common and critical programming flaws associated with the Java language and platform, alongside web-related vulnerabilities. Beyond typical errors made by Java developers, the security topics address both language-specific issues and problems arising from the runtime environment. Each vulnerability and its corresponding attack vectors are illustrated through clear, understandable exercises, followed by recommended coding guidelines and effective mitigation strategies.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and understand how to prevent them
- Comprehend the security principles underlying web services
- Master the use of various security features within the Java development environment
- Develop a practical understanding of cryptography
- Understand the security solutions offered by Java EE
- Recognize common coding mistakes and learn how to avoid them
- Gain insights into recent vulnerabilities affecting the Java framework
- Acquire practical skills in using security testing tools
- Access resources and further readings on secure coding practices
Audience
Developers
Standard Java Security
14 HoursDescription
Although the Java language and its Runtime Environment (JRE) were engineered to eliminate the most prevalent security vulnerabilities found in languages such as C and C++, developers and architects must possess more than just knowledge of Java’s built-in security features (positive security). They must also recognize the many vulnerabilities that remain relevant to Java development (negative security).
The course introduces security services by first providing a concise overview of cryptographic foundations, establishing a common baseline for understanding the purpose and operation of applicable components. Participants explore the use of these components through several practical exercises, allowing them to experiment with the discussed APIs firsthand.
Additionally, the course examines and explains the most frequent and severe programming flaws associated with the Java language and platform. This includes covering typical errors made by Java programmers as well as issues specific to the language and its environment. All vulnerabilities and corresponding attacks are demonstrated through clear, easy-to-understand exercises, followed by recommended coding guidelines and effective mitigation techniques.
Participants attending this course will
- Understand the fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and understand how to avoid them
- Learn to utilize various security features within the Java development environment
- Gain a practical understanding of cryptography
- Identify typical coding mistakes and learn how to prevent them
- Receive information on recent vulnerabilities affecting the Java framework
- Access resources and further reading materials on secure coding practices
Audience
Developers
.NET, C# and ASP.NET Security Development
14 HoursToday, a variety of programming languages enable code compilation for the .NET and ASP.NET frameworks. While these environments offer robust capabilities for security development, developers must master architecture-level and coding-level techniques to implement desired security functionalities, prevent vulnerabilities, and mitigate their exploitation.
This course aims to equip developers with practical skills through extensive hands-on exercises. Participants will learn to prevent untrusted code from executing privileged actions, secure resources via strong authentication and authorization mechanisms, manage remote procedure calls, handle sessions, explore various functional implementations, and more.
The course introduces various vulnerabilities by highlighting typical programming pitfalls specific to .NET. The discussion on ASP.NET vulnerabilities addresses diverse environment configurations and their impacts. Furthermore, the section on ASP.NET-specific vulnerabilities covers general web application security challenges alongside specialized issues and attack vectors, such as ViewState attacks and string termination attacks.
Participants attending this course will
- Comprehend the fundamental concepts of security, IT security, and secure coding
- Gain knowledge of web vulnerabilities beyond the OWASP Top Ten and understand how to avoid them
- Master the use of various security features within the .NET development environment
- Acquire practical experience in utilizing security testing tools
- Identify common coding mistakes and learn strategies to avoid them
- Stay informed about recent vulnerabilities in .NET and ASP.NET
- Access resources and further reading materials on secure coding practices
Audience
Developers
The Secure Coding Landscape
14 HoursThis course provides an overview of fundamental security concepts and the nature of vulnerabilities across different programming languages and platforms. It explains how to manage software security risks throughout the various stages of the software development lifecycle. Rather than delving deeply into technical specifics, the program highlights significant and critical vulnerabilities in diverse software development technologies. It also addresses the challenges of security testing, offering techniques and tools to help identify potential issues in code.
Participants attending this course will
- Grasp the core concepts of security, IT security, and secure coding
- Gain insight into web vulnerabilities affecting both server and client sides
- Appreciate the serious implications of improper buffer handling
- Stay informed about recent vulnerabilities in development environments and frameworks
- Learn about common coding errors and strategies to prevent them
- Understand various approaches and methodologies for security testing
Audience
Managers
Secure coding in PHP
21 HoursThis course equips PHP developers with the essential skills needed to fortify their applications against modern internet threats. It explores web vulnerabilities through PHP-based examples, extending beyond the OWASP Top Ten to address various injection attacks, script injections, session handling weaknesses, insecure direct object references, file upload issues, and more. PHP-related vulnerabilities are categorized into standard types such as missing or improper input validation, flawed error and exception handling, misuse of security features, and time- and state-related problems. The latter includes discussions on attacks like open_basedir circumvention, denial-of-service via magic floats, and hash table collision attacks. In each scenario, participants will master the key techniques and functions required to mitigate these risks.
A special emphasis is placed on client-side security, addressing issues within JavaScript, Ajax, and HTML5. The course introduces several PHP extensions, including hash, mcrypt, and OpenSSL for cryptography, as well as Ctype, ext/filter, and HTML Purifier for input validation. It also outlines best practices for hardening PHP configurations (php.ini), Apache, and the server environment generally. Additionally, an overview of various security testing tools and techniques is provided for developers and testers, covering security scanners, penetration testing, exploit packs, sniffers, proxy servers, fuzzing tools, and static source code analyzers.
The introduction of vulnerabilities and configuration practices is reinforced by hands-on exercises that demonstrate the impact of successful attacks, show how to apply mitigation techniques, and introduce the use of various extensions and tools.
Participants attending this course will:
- Grasp fundamental concepts of security, IT security, and secure coding.
- Understand web vulnerabilities beyond the OWASP Top Ten and learn how to avoid them.
- Gain knowledge of client-side vulnerabilities and secure coding practices.
- Develop a practical understanding of cryptography.
- Learn to utilize various security features within PHP.
- Identify common coding mistakes and understand how to prevent them.
- Stay informed about recent vulnerabilities affecting the PHP framework.
- Acquire practical experience with security testing tools.
- Access resources and further reading on secure coding practices.
Audience
Developers
Microsoft SDL Core
14 HoursThe Combined SDL core training offers an in-depth look at secure software design, development, and testing via the Microsoft Secure Development Lifecycle (SDL). It begins with a level 100 overview of the fundamental SDL building blocks, followed by design techniques aimed at detecting and correcting flaws early in the development process.
Focusing on the development phase, the course outlines common security-related programming bugs in both managed and native code. It presents attack methods for the discussed vulnerabilities alongside mitigation techniques, all explained through hands-on exercises that provide participants with practical, live hacking experience. The course introduces various security testing methods and demonstrates the effectiveness of different testing tools. Participants can understand how these tools operate by applying them to previously discussed vulnerable code through practical exercises.
Participants attending this course will
Understand basic concepts of security, IT security, and secure coding
Become familiar with the essential steps of the Microsoft Secure Development Lifecycle
Learn secure design and development practices
Learn about secure implementation principles
Understand security testing methodology
- Get sources and further readings on secure coding practices
Audience
Developers, Managers
Security Testing
14 HoursAfter becoming familiar with vulnerabilities and attack methods, participants learn about the general approach and methodology for security testing, as well as techniques that can be applied to reveal specific vulnerabilities. Security testing should start with information gathering about the system (ToC, i.e. Target of Evaluation), then a thorough threat modeling should reveal and rate all threats, arriving to the most appropriate risk analysis-driven test plan.
Security evaluations can happen at various steps of the SDLC, and so we discuss design review, code review, reconnaissance and information gathering about the system, testing the implementation and the testing and hardening the environment for secure deployment. Many security testing techniques are introduced in details, like taint analysis and heuristics-based code review, static code analysis, dynamic web vulnerability testing or fuzzing. Various types of tools are introduced that can be applied in order to automate security evaluation of software products, which is also supported by a number of exercises, where we execute these tools to analyze the already discussed vulnerable code. Many real life case studies support better understanding of various vulnerabilities.
This course prepares testers and QA staff to adequately plan and precisely execute security tests, select and use the most appropriate tools and techniques to find even hidden security flaws, and thus gives essential practical skills that can be applied on the next day working day.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Learn client-side vulnerabilities and secure coding practices
- Understand security testing approaches and methodologies
- Get practical knowledge in using security testing techniques and tools
- Get sources and further readings on secure coding practices
Audience
Developers, Testers
Secure Web Application Development and Testing
21 HoursProtecting web-accessible applications demands skilled security professionals who remain constantly updated on current attack vectors and trends. A wide array of technologies and environments facilitate the comfortable development of web applications. Developers must not only understand platform-specific security issues but also be aware of general vulnerabilities that apply regardless of the development tools used.
This course provides an overview of applicable security solutions for web applications, with a special emphasis on understanding the most critical cryptographic techniques. Various web application vulnerabilities are examined on both the server side (following the OWASP Top Ten) and the client side, illustrated through relevant attack scenarios. These are followed by recommended coding practices and mitigation strategies to prevent associated problems. The module on secure coding concludes by discussing common security-related programming errors, including issues with input validation, improper use of security features, and code quality.
Testing plays a crucial role in ensuring the security and robustness of web applications. Various approaches, ranging from high-level auditing and penetration testing to ethical hacking, can be employed to identify different types of vulnerabilities. However, to go beyond easily discoverable 'low-hanging fruits,' security testing must be well-planned and properly executed. Recall that while a security tester ideally needs to find all bugs to fully protect a system, an adversary only needs to find one exploitable vulnerability to gain access.
Practical exercises will aid in understanding web application vulnerabilities, programming mistakes, and, most importantly, mitigation techniques. Through hands-on trials with various testing tools—ranging from security scanners and sniffers to proxy servers, fuzzing tools, and static source code analyzers—this course equips participants with essential practical skills applicable directly in the workplace the following day.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and know how to avoid them
- Gain knowledge of client-side vulnerabilities and secure coding practices
- Develop a practical understanding of cryptography
- Understand security testing approaches and methodologies
- Acquire practical knowledge in using security testing techniques and tools
- Stay informed about recent vulnerabilities in various platforms, frameworks, and libraries
- Access resources and further readings on secure coding practices
Audience
Developers, Testers
DevOps Security: Creating a DevOps Security Strategy
7 HoursIn this instructor-led, live course in Turkey, participants will learn how to formulate an appropriate security strategy to tackle the DevOps security challenge.
EC-Council Certified DevSecOps Engineer (ECDE)
28 HoursThe EC-Council Certified DevSecOps Engineer (ECDE) program is a practical course designed to empower professionals with the expertise needed to embed security throughout the entire DevOps lifecycle, facilitating secure software development from initial planning through to deployment.
This instructor-led, live training, available both online and onsite, targets intermediate-level software and DevOps professionals who aim to integrate robust security practices into CI/CD pipelines, ensuring that code delivery is both secure and compliant.
Upon completion of this training, participants will be capable of:
- Grasping the core principles and practices of DevSecOps.
- Securing every phase of the CI/CD pipeline using automated tools.
- Executing secure coding standards and vulnerability scanning techniques.
- Preparing for the ECDE certification through hands-on labs and comprehensive reviews.
Course Format
- Interactive lectures and discussions.
- Practical application of DevSecOps tools within simulated pipelines.
- Guided exercises centered on secure development and deployment processes.
Customization Options
- For customized training tailored to your team’s specific workflows or toolchains, please contact us to arrange a session.
How to Write Secure Code
35 HoursThis course aims to assist in the following areas:
- Assist developers in mastering secure coding techniques.
- Support software testers in evaluating application security before deployment to production.
- Help software architects understand the risks associated with applications.
- Enable team leaders to establish security baselines for developers.
- Assist web masters in configuring servers to prevent misconfigurations.
Secure Developer Java (Inc OWASP)
21 HoursThis course explores secure coding principles and practices for Java, utilizing the testing methodology of the Open Web Application Security Project (OWASP). The Open Web Application Security Project is an online community that develops freely accessible articles, methodologies, documentation, tools, and technologies focused on web application security.