Duration: 2 days

Secure Coding Workshop

Master this secure coding workshop tо enhance software security skills..

Overview

A two-day secure coding workshop where you’ll master key practices to build secure software, join us and take your coding to the next level!

What will you learn:
Understanding of secure coding practices Adopting industry-leading standards for software security Knowledge and confidence to navigate potential security pitfalls Monitor your software application for potential vulnerabilities Techniques and methods for vulnerability mitigation Advanced cryptographic practices

SECURE CODING COURSE INTRODUCTION

In an era оf increasing digital threats, secure coding іs essential for protecting software from vulnerabilities. This secure coding workshop provides an in-depth exploration оf secure coding principles through practical exercises and expert instruction, ensuring participants can apply these practices effectively іn their development work.

COURSE OBJECTIVE

By the end of this course, participants will have a comprehensive understanding of secure coding principles and will be able to apply industry standards to enhance software security. They will gain the skills to identify and address security vulnerabilities, monitor their applications for potential threats, and implement effective mitigation strategies. Additionally, participants will develop proficiency in advanced cryptographic techniques to safeguard their software. 

 

TARGET AUDIENCE

  • Software Engineers
  • Technical Leads and Managers
  • Quality Assurance/Testers
  • Information Security Professionals
  • Software Architects

COURSE AGENDA

Duration:

2 days

Book_open_alt_light-svg

Day 1:

Introduction to Secure Coding, featuring real-world examples of vulnerability exploits, with a focus on OWASP Secure Coding practices such as Input Validation, Authentication and Access Control, and Session Management, followed by hands-on coding sessions to apply these concepts in practice. 

Book_open_alt_light-svg

Day 2:

Completing the OWASP Secure Coding practices, transferring to OWASP Top 10 and introducing Software Security Development Framework (SSDF) and Supply Chain Levels for Software Artifacts (SLSA) into software development life cycle.  

Book_open_alt_light-svg

Day 3:

Exploring Public Key Infrastructure (PKI) and mutual TLS (mTLS) with hands-on examples and concluding with containerization and the integration of security checks within application pipelines. 

Get in touch

If you have any questions, we are one click away.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Contact us

Schedule a call with an expert