INNOVATION

Creating, designing and developing new security solutions to meet complex operational missions is a crucial factor in remaining relevant. Today's cyber threats adapt rapidly and grow greater every day. And at Tresys we are focused on continually revising the design and range of our technology. We work closely with the Open Source community to make sure that baseline security technologies are readily available and distributed, provide training to the community on advanced security technologies, develop new solutions to accelerate our service offerings, and create new products that solve recurring, challenging mission requirements. Our engineers and scientists work closely with our customers to ensure that all our innovative ideas will provide value and meet their security demands. Innovation is the heart of Tresys.


TRAINING


Tresys offers training to our customers and partners. The following classes are offered periodically. They are also available on an as-requested basis to meet customer’s schedules.
Title
Advanced Security-Enhanced Linux (SELinux) Policy Development
Overview
Tresys offers an advanced class intended for engineers, and developers who have a background in Linux security. This training provides analysts, engineers, and developers an in-depth overview of the strong access control mechanisms that make SELinux critical to the strongest secure Linux implementations. Sometimes called flexible mandatory access control, these mechanisms implement a policy using type enforcement that limits access of processes to only the information that is needed. This training will help one learn how to analyze, test, configure, modify, and develop SELinux access control policies.
Topics
Overview of SELinux Policy to include background, access control, policy concepts and language, and policy mechanisms. Policy language for the purpose of understanding object classes and permissions, type enforcement rules and macros, roles and users, constraints and security contexts, and Booleans and conditional statements. Applying and using policies for building and installing, file system labeling, analyzing and debugging, and editing and configuration. New policy technologies such as managed policy and reference policy.
Pre-requisites
Background and understanding of fundamental Linux Security concepts.
Duration
Classes are typically scheduled as 3-day on-site training at the Tresys facility in the Washington DC and Baltimore metro areas.
Schedule
  • No classes are currently scheduled for 2014.
  • For more information about future classes, including custom classes, please email sales@tresys.com
Title
SE for Android™ for Secure Mobile
Overview
This training class provides an overview of the SE Android Open Source projects and how it is currently being used in efforts across the US Government.
Topics
Introduction of Security Enhanced Android, Core security features, benefits of protections it provides, strategies for properly using SE Android, demonstration and hands-on exercises.
Pre-requisites
Background and understanding of fundamental SELinux and Android concepts.
Duration
Classes are typically scheduled as 3-day on-site training at the Tresys facility in the Washington DC and Baltimore metro areas.
Schedule
  • No classes are currently scheduled for 2014.
  • For more information about future classes, including custom classes, please email sales@tresys.com

For courses under development, or to request a customized course, please contact sales@tresys.com.

LIBRARY


Our Library contains Tresys publications, White Papers, customer profiles, and recommended security blogs.

OPEN SOURCE


Our Open Source page provides an overview of active Tresys Open Source projects and efforts.

Android is a trademark of Google Inc.

The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Inc.