Early bird!
virtual or
in class

Application Security Crash Course

0 out of 5

490.00 final price

This is now a virtual classroom course. You can find more information about our virtual classroom here

Defects, bugs and logic flaws are consistently the primary cause of commonly exploited software vulnerabilities. Secure coding is the practice of developing computer software in a way that protects against the accidental introduction of security vulnerabilities. The Secure Coding course has been specifically designed to cover all the security concepts and notions a modern software developer will handle.

Clear

Description

Defects, bugs and logic flaws are consistently the primary cause of commonly exploited software vulnerabilities. Secure coding is the practice of developing computer software in a way that protects against the accidental introduction of security vulnerabilities. The Secure Coding course has been specifically designed to cover all the security concepts and notions a modern software developer will handle. This 16-hour hands-on course will provide a strong understanding of these security topics using one or more of the following widely used programming languages:

  • Java
  • Javascript
  • PHP

More specifically, during the 4 days of the course participants are expected to combine theory and practice across the following areas:

  • Software Security
  • OWASP Top 10 Vulnerabilities
  • TLS
  • Security Headers
  • Cookie Guidelines

Who should attend

This hands-on course is mainly targeted to Software Developers, Software Engineers but also to anyone else interested in developing secure web applications.

Prerequisites

This workshop will be highly appreciated by professionals with working experience in a major web programming language such as Java, Javascript, PHP, C# etc.

What will you learn

During this 16 hour workshop participants are expected to cover best practices and hands-on examples and exercises on the following areas:

  • Software Security:
    • Data Protection
    • Data in transit
    • Data at rest
    • Sensitive Data (Personally identifiable information (PII), Password etc.)
    • Input Validation (File upload etc.)
    • Mitigating Injection Attacks (SQL, HTML, JavaScript and JSON, URL, Formatting Strings, OS Command Strings etc.)
  • OWASP Top 10 Vulnerabilities
  • TLS/HSTS
  • Cookie Guidelines

Schedule

Next virtual session has been scheduled for 1-2-3-4 February 2022 10:00am – 2:00pm EET.