Back to All Events

AppSec for Developers

Special Price


Ends on Oct 1st


Whether you are an Architect, Developer, Pentester, Security or DevOps Engineer, or anyone with a need to understand and manage vulnerabilities in a Cloud environment, understanding relevant hacking techniques, and how to protect yourself from them, is critical. This course covers both the theory a well as a number of modern techniques that may be used to compromise various Cloud services and infrastructure.

Penetration testing (security testing) as an activity tends to capture security vulnerabilities at the end of the SDLC and then it is often too late to influence fundamental changes in the way the code is written.

This class has being written due to the increasing need for developers to code in a secure manner. It is critical to introduce security as a quality component into the development cycle. This class aims at educating developers about various security vulnerabilities through hands-on practice using our intentionally developed insecure web application built on Microsoft .NET platform. Throughout this class, developers will be able to get on the same page with security professionals, understand their language, learn how to fix or mitigate vulnerabilities learnt during the class and also get acquainted with some real-world breaches, for example, “The Equifax” breach in September 2017 and application vulnerabilities from popular websites like Facebook, Google, Instagram, Paypal etc.

The techniques discussed in this class are mainly focused on .NET and Java technologies owing to their huge adoption in various enterprises in building web applications. However, the approach is generic and developers from other language backgrounds can easily grasp and implement the knowledge learnt within their own environments.

Class Details

The class is a highly practical class that targets web developers, pen testers, and anyone else wanting to write secure code, or audit code against security flaws. The class covers a variety of best security practices and in-depth defense approaches which developers should be aware of while developing applications. The class also covers some quick techniques which developers can use to identify various security issues throughout the code review process.

Students can access our online lab which is riddled with multiple vulnerabilities. Students will receive demonstrations and hands-on practice of the vulnerabilities to better understand and grasp the issues, followed by various techniques and recommendations on how to go about fixing them. While the class covers industry standards such as OWASP top 10 and SANS top 25 security issues, it also covers various real world issues such as the business logic and authorization flaws.

Day 1

Module 1. 
Application Security Basics
Module 2
Understanding the HTTP Protocol
Module 3
Security Misconfigurations
Module 4
Insufficient Logging and Monitoring
Module 5
Authentication Flaws
Module 6
Authorization Bypass Techniques
Module 7
Cross Site Scripting (XSS)
Module 8
Cross-Site Request Forgery Scripting (CSRF)

Day 2

Module 9
Server Side Request Forgery(SSRF)
Module 10
SQL Injection
Module 11
XML External Entity (XXE) Attacks
Module 12
Unrestricted File Uploads
Module 13
Deserialization Vulnerabilities
Module 14
Client-Side Security Concerns
Module 15
Source Code Review
Module 16.

Should be taken after the DevSecOps Training Session, but not required.

Price: $2,195