Diversity and gender balance is one of the corner stones and main objectives of Ericsson. We believe that diverse, inclusive teams drive performance and innovation, which is precisely what prompted Ericsson in Finland to begin the cooperation with #MimmitKoodaa.

At Ericsson, we strive to make learning a natural part of our daily lives by supporting and inspiring our people to find new opportunities for gaining and sharing knowledge. This, in fact, is the same drive behind the volunteers and organizers of the #MimmitKoodaa.

Participating in the program to share our professional knowledge, gives us the opportunity to give back to the society and represent the same culture we foster at our company.

Tietoturva

– Security aspects in software development

Tässä videosarjassa asiantuntijat Suomen Ericssonilta kertovat ohjelmakehityksen tietoturvasta. Voit katsoa videot YouTubessa tai tilata linkin Howspaceen, jossa voit opiskella aihetta syvällisemmin sisältöön liittyvien kysymysten avulla sekä kysyä lisää!

In this video series experts from Ericsson Finland talk about security aspects in software development. You can watch the videos in YouTube. Also, you can order a link to Howspace, where you can learn more by taking quizzes and ask questions!

All content except the intro is in English.

STAY TUNED for 2023!

– What should every developer know about UX?

Why is user experience design important, and why should a developer care about it? In this series, we go through UX basics from a developer point of view: what the UX principles are, what tools to use, how UX designers usually work, and how to collaborate effectively to implement best possible solution.

Mitä on tietoturva kun #MimmitKoodaa?

 

Tämä video on ensimmäinen osa Ericssonin Mimmit koodaa yhteisölle luomasta videosarjasta jossa käsitellään tietoturvaa.

Sarjan ensimmäisessä osassa Salla Rantamäki ja Jussi Auvinen kertovat yleisellä tasolla, miten tietoturva liittyy ohjelmistokehitykseen softatuotteen elinkaaren aikana.

Esityksen sisältö:
– Koulutus
– Vaatimustenhallinta ja uhkamallinnus
– Suunnittelu
– Turvallinen ohjelmointi
– Testaus ja todentaminen
– Käyttöönotto ja ylläpito

Check out the episodes of the series

Threat Modeling

Heikki Mäki talks about threat modeling; how to recognize the security flaws. He explains what threat modeling is, why you should do it, and how to do it. Maybe you didn’t know, but most of us are already doing threat modeling in our daily lives!

Security architecture

Patrik Teppo talks about security architecture principles. ICT systems, as well as buildings, cannot be built for long without proper design and architecture. In terms of security, there are a number of principles that are covered in this presentation, such as perimeter security model, defense in depth and zero trust architecture.

Secure Coding

Jussi Auvinen talks about secure coding; how to avoid security pitfalls when coding. He talks also about best practices, programming standards and different tools. In the end of the presentation Jussi gives a demo!

Vulnerability Assessment

Antti Kiuru talks about vulnerability assessments, in other words how to discover weaknesses in information systems. He goes through different methods and tools, such as web application scanners and network scanners, fuzz testing and how to automate testing.

Penetration Testing

Antti Kiuru talks about penetration testing, also known as a pen test. Penetration test is a simulated cyber attack against your ICT systems to check for exploitable vulnerabilities. He talks also about pen test tools, white box and black box testing, red teams, and the ethical code. Finally, Antti gives a few tips how to become a pen tester.

Vulnerability Management

Related to incident response, vulnerability management is discussed by Raquel Aguiar Santos and Sonny van Lingen. Today, most software consists of numerous open source and other third-party components. There may be vulnerabilities in all these components and, of course, in your own code. To keep your own software product secure, you need to keep track of vulnerabilities, make fixes, and publish updates on an ongoing basis.

Incident Response

Umair Bukhari talks about managing security incidents. Security incidents are happening all the time, and companies and software developers must constantly be prepared to respond to them to protect their own and their customers’ information from misuse. There must be a process and designated people in charge for managing security incidents for having prompt and planned operations in place.

Ericsson logo.

 

Ericsson is one of the leading providers of Information and Communication Technology (ICT) to service providers.

We enable the full value of connectivity by creating game-changing technology and services that are easy to use, adopt, and scale, making our customers successful in a fully connected world.

Our comprehensive portfolio ranges across Networks, Digital Services, Managed Services and Emerging Business; powered by 5G and IoT platforms.

Click here to see what we do in Finland

Check out our open positions in Finland!

Kyllä, haluan pysyä kuulolla

Liittymällä postituslistallemme saat myös ensimmäisenä tiedon julkaisuista koulutuksista. Koulutuksia tarjoavat Ohjelmisto- ja e-business ry:n jäsenet ja koulutukset ovat mimmeille maksuttomia.