Writing web applications can be rather complex – reasons range from dealing with legacy technologies or under documented third-party components to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likely would they be to succeed?
This course will change the way you look at your code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and – more importantly – best practices you can apply to protect yourself. We cover typical Web vulnerabilities with a focuson how they affect web apps on the entire stack – from the base environment to modern AJAX and HTML5-based frontends. In addition, we discuss the security aspects of different platforms as well as typical programming mistakes you need to be aware of. We present the entire course through live practical exercises to keep it engaging and fun.
Writing secure code will give you a distinct edge over your competitors. It is your choice to be ahead of the pack – take a step and be a game-changer in the fight against cybercrime.
Training level: Basic
During the training you will be solving hands-on exercises with the help of the trainer on a cloud virtual machine.
These are the requirements to be able to use the VM smoothly.Hardware
Recommended hardware specification
General software engineer capabilities
Programmers, software developers, team leaders, managers
Participants will receive a welcome page prior to the training including the course material in a pdf file and access to the cloud VMs during the training.
Dániel Szpisják: We are surrounded by complex systems both in our everyday lives and at work, and these systems always have flaws. I have been looking for flaws like this ever since I can remember, and luckily, constantly searching for mistakes is not just my job but also my hobby. This is a way of thinking for me, making it easier for me to tune into how hackers work and find possible vulnerabilities before an actual attack occurs. However, this wouldn’t be enough to pass on my knowledge. I have an extraordinary trust in knowledge sharing, continuous learning, and development. To my great delight, I can awaken the motivation in participants to become secure coders. This area is totally unique, and I believe that the more developers who take security seriously, the better society and communities will work. Security is not always a rewarding topic among software developers, although a developer trained on this topic is much more valuable to their employer.