brings security and UX to you
brings security and UX to you
Diversity and gender balance is one of the corner stones and main objectives of Ericsson. We believe that diverse, inclusive teams drive performance and innovation, which is precisely what prompted Ericsson in Finland to begin the cooperation with #MimmitKoodaa.
At Ericsson, we strive to make learning a natural part of our daily lives by supporting and inspiring our people to find new opportunities for gaining and sharing knowledge. This, in fact, is the same drive behind the volunteers and organizers of the #MimmitKoodaa.
Participating in the program to share our professional knowledge, gives us the opportunity to give back to the society and represent the same culture we foster at our company.
– Security aspects in software development
Tässä videosarjassa asiantuntijat Suomen Ericssonilta kertovat ohjelmakehityksen tietoturvasta. Voit katsoa videot YouTubessa tai tilata linkin Howspaceen, jossa voit opiskella aihetta syvällisemmin sisältöön liittyvien kysymysten avulla sekä kysyä lisää!
In this video series experts from Ericsson Finland talk about security aspects in software development. You can watch the videos in YouTube. Also, you can order a link to Howspace, where you can learn more by taking quizzes and ask questions!
All content except the intro is in English.
STAY TUNED for 2023!
– What should every developer know about UX?
Why is user experience design important, and why should a developer care about it? In this series, we go through UX basics from a developer point of view: what the UX principles are, what tools to use, how UX designers usually work, and how to collaborate effectively to implement best possible solution.
Mitä on tietoturva kun #MimmitKoodaa?
Tämä video on ensimmäinen osa Ericssonin Mimmit koodaa yhteisölle luomasta videosarjasta jossa käsitellään tietoturvaa.
Sarjan ensimmäisessä osassa Salla Rantamäki ja Jussi Auvinen kertovat yleisellä tasolla, miten tietoturva liittyy ohjelmistokehitykseen softatuotteen elinkaaren aikana.
– Vaatimustenhallinta ja uhkamallinnus
– Turvallinen ohjelmointi
– Testaus ja todentaminen
– Käyttöönotto ja ylläpito
Heikki Mäki talks about threat modeling; how to recognize the security flaws. He explains what threat modeling is, why you should do it, and how to do it. Maybe you didn’t know, but most of us are already doing threat modeling in our daily lives!
Patrik Teppo talks about security architecture principles. ICT systems, as well as buildings, cannot be built for long without proper design and architecture. In terms of security, there are a number of principles that are covered in this presentation, such as perimeter security model, defense in depth and zero trust architecture.
Jussi Auvinen talks about secure coding; how to avoid security pitfalls when coding. He talks also about best practices, programming standards and different tools. In the end of the presentation Jussi gives a demo!
Antti Kiuru talks about vulnerability assessments, in other words how to discover weaknesses in information systems. He goes through different methods and tools, such as web application scanners and network scanners, fuzz testing and how to automate testing.
Antti Kiuru talks about penetration testing, also known as a pen test. Penetration test is a simulated cyber attack against your ICT systems to check for exploitable vulnerabilities. He talks also about pen test tools, white box and black box testing, red teams, and the ethical code. Finally, Antti gives a few tips how to become a pen tester.
Related to incident response, vulnerability management is discussed by Raquel Aguiar Santos and Sonny van Lingen. Today, most software consists of numerous open source and other third-party components. There may be vulnerabilities in all these components and, of course, in your own code. To keep your own software product secure, you need to keep track of vulnerabilities, make fixes, and publish updates on an ongoing basis.
Umair Bukhari talks about managing security incidents. Security incidents are happening all the time, and companies and software developers must constantly be prepared to respond to them to protect their own and their customers’ information from misuse. There must be a process and designated people in charge for managing security incidents for having prompt and planned operations in place.
Ericsson is one of the leading providers of Information and Communication Technology (ICT) to service providers.
We enable the full value of connectivity by creating game-changing technology and services that are easy to use, adopt, and scale, making our customers successful in a fully connected world.
Our comprehensive portfolio ranges across Networks, Digital Services, Managed Services and Emerging Business; powered by 5G and IoT platforms.
Kyllä, haluan pysyä kuulolla
Liittymällä postituslistallemme saat myös ensimmäisenä tiedon julkaisuista koulutuksista. Koulutuksia tarjoavat Ohjelmisto- ja e-business ry:n jäsenet ja koulutukset ovat mimmeille maksuttomia.