What I do
Tailor-made courses on how to build software following the best practices of secure coding.
Identification, classification and prioritization of vulnerabilities in computing systems
Execution of simulated cyber attacks against computer systems to check for exploitable vulnerabilities.
Secure Coding & Review
Manual review of application's source code in an attempt to identify vulnerabilities in the code.