Security for Developers

Course objective Security for Developers is to help you learn to master the techniques and methodology of hacking (ethics) that are used in penetrating systems. The course is designed for IT enthusiasts, network and systems engineers, security officers.

To protect yourself from hackers, you need to think like a hacker.

This training is based on a practical approach to everyday situations and contains laboratories based on real environments. For demos/labs, target virtual machines are provided.

The objective of the course is to help you learn to master the (ethical) hacking techniques and methodology that are used in penetrating systems. The course is designed for IT enthusiasts, network and systems engineers, security officers.

Below are the main topics, both theoretical and practical, of this course:

Basic Issues (Causes. Defenses)
Web technologies (HTTP Protocol, Web Functionality, Encoding)
Mapping (Spidering and Analysing)
Authentication attack (technologies, flaws, fixes, brute force)
Attacking session management (State, Tokens, Flaws)
Attacking access controls (common vulnerabilities, attacks)
Attacking data warehouses (SQL Injection, Bypassing Filters, Escalation)
Bypassing Client-Side Controls (Browser Interception, HTML interception, Fixes)
Attacking the server (OS command Injection, Path Traversal, Mail Injection, File Upload)
Attacking Application Logic
Cross Site Scripting
Attacking users (CSRF, ClickJacking, HTML Injection)

Demonstrations:

Spidering, Website Analyzer
Brute-Force
Session Hijacking via Mann-in-The-Middle
Get Gmail or Facebook Passwords via SSLStrip
SQL Injection
Upload File and Remote Execution
Cross-Site Scripting (Stored + Reflected, Preventing XSS)
CSRF (Change password trough CSRF vuln., Preventing CSRF)

Who is it for?

Mostly developers and software architects.
But equally useful for system administrators, technical managers and CISOs.

What will you learn?

  • Developing "out-of-box" thinking.
  • See security from an offensive perspective
  • Learn security best practices and (most and least) common attacks
  • Learn how to protect your applications and infrastructure
  • Learn secure coding concepts

Prerequisites:

Knowledge of secure coding concepts

Course schedule:

Course materials are in English. Teaching is done in Romanian.

Overview of Web Penetration Testing
OWASP Top Ten Web Vulnerabilities
Technical measures and best practices
OWASP Top 10 Mobile Vulnerabilities
HTTP Security Headers
JSON Web Tokens
Secure coding – OWASP Application Security Verification Standard (ASVS)
Vulnerabilities of lesser-known web applications
Threat modeling (optional)

We recommend continuing with:

Certified Ethical Hacker

Security for Developers

Security for Developers

Personalized offers for groups of at least 2 people

Course details

2
days

Price:

660 EUR

Delivery:

Classroom Teaching, Hybrid Classroom, Virtual Classroom

Level:

2. Intermediate