CL-STS
Onsite / Virtual classroom
3 days
Ends with an exam
Audience: DevelopersTesters
Preparedness: General QA and testing
Exercises: Hands-on
After getting familiar with the vulnerabilities and the attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities. Security testing should start with information gathering about the system (ToC, i.e. Target of Evaluation), then a thorough threat modeling should reveal and rate all threats, arriving to the most appropriate risk analysis-driven test plan.
Security evaluations can happen at various steps of the SDLC, and so we discuss design review, code review, reconnaissance and information gathering about the system, testing the implementation and the testing and hardening the environment for secure deployment. Many different security testing techniques are introduced in details, like taint analysis and heuristics-based code review, static code analysis, dynamic web vulnerability testing or fuzzing. Various types of tools are introduced that can be applied in order to automate security evaluation of software products, which is also supported by a number of exercises, where we execute these tools to analyze the already discussed vulnerable code. Many real life case studies support better understanding of various vulnerabilities.
This course prepares testers and QA staff to adequately plan and precisely execute security tests, select and use the most appropriate tools and techniques to find even hidden security flaws, and thus gives essential practical skills that can be applied on the next day working day.
IT security and secure coding
Web application security
Client-side security
Security testing
Security testing techniques and tools
Source code review
Input validation
Improper use of security features
Testing the implementation
Deployment environment
Principles of security and secure coding
Knowledge sources
Understand basic concepts of security, IT security and secure coding
Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
Learn about XML security
Learn client-side vulnerabilities and secure coding practices
Understand security testing approaches and methodologies
Get practical knowledge in using security testing techniques and tools
Learn how to set up and operate the deployment environment securely
Get sources and further readings on secure coding practices
0 of 0
Handle complex subjects, provide practical skills training, and hands-on experience, enable discussion and collaboration, and maintain the motivation and accountability of learners.
Courses with couple of thousands of participants to be conducted in a short time frame, in any time zone, on-site or online.
Utilzing our R&D&I we combine academic knowledge with practical application, we develop and tailor courses to latest trends and clients' needs.
We use our proprietary platform with virtual machines for a safe practice, coding, and experimentation environment.
Budafoki street 187-189.
Budapest, 1117, Hungary
+36 1 205 3098
Trusted by top companies and brands: