Secure Web Application Development and Testing Training Course
Protecting web-accessible applications demands security professionals who are thoroughly prepared and constantly informed about current attack methods and trends. A wide array of technologies and environments facilitates the comfortable development of web applications. It is crucial to be aware not only of the security issues specific to these platforms but also of general vulnerabilities that apply regardless of the development tools used.
This course provides an overview of applicable security solutions in web applications, with a special emphasis on understanding the most important cryptographic solutions. Various web application vulnerabilities are presented on both the server side (following the OWASP Top Ten) and the client side, demonstrated through relevant attacks, followed by recommended coding techniques and mitigation methods to avoid associated problems. The topic of secure coding is concluded by discussing typical security-relevant programming mistakes in input validation, improper use of security features, and code quality.
Testing plays a vital role in ensuring the security and robustness of web applications. Various approaches – from high-level auditing through penetration testing to ethical hacking – can be applied to find vulnerabilities of different types. However, if you want to go beyond the easy-to-find low-hanging fruits, security testing should be well-planned and properly executed. Remember: security testers should ideally find all bugs to protect a system, while for adversaries, it is enough to find one exploitable vulnerability to penetrate into it.
Practical exercises will help in understanding web application vulnerabilities, programming mistakes, and most importantly, the mitigation techniques. Together with hands-on trials of various testing tools from security scanners, through sniffers, proxy servers, fuzzing tools, to static source code analyzers, this course gives the essential practical skills that can be applied the next day at the workplace.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and know how to avoid them
- Learn about client-side vulnerabilities and secure coding practices
- Have a practical understanding of cryptography
- Understand security testing approaches and methodologies
- Get practical knowledge in using security testing techniques and tools
- Be informed about recent vulnerabilities in various platforms, frameworks, and libraries
- Get sources and further readings on secure coding practices
Audience
Developers, Testers
This course is available as onsite live training in Norway or online live training.Course Outline
- IT security and secure coding
- Web application security
- Client-side security
- Client-side security
- Practical cryptography
- XML security
- JSON security
- Denial of service
- Security testing
- Security testing techniques
- Principles of security and secure coding
- Knowledge sources
Open Training Courses require 5+ participants.
Secure Web Application Development and Testing Training Course - Booking
Secure Web Application Development and Testing Training Course - Enquiry
Secure Web Application Development and Testing - Consultancy Enquiry
Testimonials (2)
Learning how to use new tooling. Mostly seeing how security testing could be performed
Jason - Kropman
Course - Secure Web Application Development and Testing
I liked the trainer was passionate about the subject and very convincing too.
Diana Vladulescu
Course - Secure Web Application Development and Testing
Upcoming Courses
Related Courses
Android Security
14 HoursAndroid is an open platform designed for mobile devices, including smartphones and tablets. It offers a wide array of security features to facilitate the development of secure software; however, it also lacks certain security aspects found in other handheld platforms. This course provides a comprehensive overview of these features, highlighting critical shortcomings related to the underlying Linux architecture, file systems, and the general environment, as well as the use of permissions and other Android software development components.
Common security pitfalls and vulnerabilities affecting both native code and Java applications are described, along with recommendations and best practices to avoid and mitigate them. In many instances, the issues discussed are supported by real-life examples and case studies. Finally, we provide a brief overview of how to use security testing tools to uncover security-related programming bugs.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Learn about Android security solutions
- Learn to utilize various security features of the Android platform
- Gain information about recent vulnerabilities in Java on Android
- Learn about common coding mistakes and how to avoid them
- Gain understanding of native code vulnerabilities on Android
- Recognize the severe consequences of insecure buffer handling in native code
- Understand architectural protection techniques and their weaknesses
- Obtain resources and further reading on secure coding practices
Audience
Professionals
Network Security and Secure Communication
21 HoursImplementing a secure networked application can be challenging, even for developers who have previously utilized various cryptographic building blocks (such as encryption and digital signatures). To help participants grasp the role and application of these cryptographic primitives, a solid foundation is first laid regarding the core requirements of secure communication: secure acknowledgment, integrity, confidentiality, remote identification, and anonymity. This includes presenting typical problems that can undermine these requirements alongside real-world solutions.
Given that cryptography is a critical aspect of network security, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Rather than presenting an in-depth mathematical background, these elements are explored from a developer's perspective, illustrating typical use-case examples and practical considerations related to cryptography, such as public key infrastructures. Security protocols in various areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families, such as IPSEC and SSL/TLS.
Typical cryptographic vulnerabilities are discussed, both in relation to certain crypto algorithms and cryptographic protocols (e.g., BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE, and similar), as well as the RSA timing attack. In each case, the practical considerations and potential consequences of each problem are described, again, without delving into deep mathematical details.
Finally, as XML technology is central to data exchange for networked applications, the security aspects of XML are described. This includes the usage of XML within web services and SOAP messages, alongside protection measures such as XML signature and XML encryption. The discussion also covers weaknesses in these protection measures and XML-specific security issues, such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Understand the requirements of secure communication
- Learn about network attacks and defenses at different OSI layers
- Have a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Gain information about some recent related vulnerabilities
- Understand security concepts of web services
- Obtain sources and further readings on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursThis three-day course introduces the fundamentals of securing C/C++ code against exploitation by malicious actors, focusing on vulnerabilities related to memory management and input handling. The curriculum emphasizes core principles for writing robust and secure software.
Advanced Java Security
21 HoursEven seasoned Java developers do not always fully master the diverse security services provided by Java, nor are they always aware of the various vulnerabilities pertinent to web applications built in Java.
This course introduces the security components of the Java Standard Edition while addressing security issues within Java Enterprise Edition (JEE) and web services. Discussions of specific services are grounded in the fundamentals of cryptography and secure communication. A variety of exercises focus on declarative and programmatic security techniques in JEE, and both transport-layer and end-to-end security for web services are examined. The practical application of these components is illustrated through several hands-on exercises, allowing participants to experiment with the discussed APIs and tools firsthand.
The course also covers and explains the most common and severe programming flaws associated with the Java language and platform, as well as web-related vulnerabilities. In addition to typical errors made by Java programmers, the introduced security vulnerabilities encompass language-specific issues and problems arising from the runtime environment. All vulnerabilities and associated attacks are demonstrated through accessible exercises, followed by recommended coding guidelines and potential mitigation techniques.
Participants attending this course will
- Understand the fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and discover how to prevent them
- Grasp the security concepts underlying web services
- Learn to utilize various security features of the Java development environment
- Gain a practical understanding of cryptography
- Understand the security solutions offered by Java EE
- Learn about common coding mistakes and how to avoid them
- Receive information on recent vulnerabilities in the Java framework
- Acquire practical knowledge in using security testing tools
- Obtain resources and further reading materials on secure coding practices
Audience
Developers
Standard Java Security
14 HoursDescription
The Java language and its Runtime Environment (JRE) were engineered to eliminate many of the severe security vulnerabilities commonly found in other languages, such as C and C++. However, software developers and architects must do more than just know how to leverage the positive security features available in the Java environment; they must also recognize the numerous vulnerabilities that remain relevant to Java development (negative security).
Before introducing security services, the course provides a concise overview of cryptography fundamentals, establishing a common baseline for understanding the purpose and operation of the components involved. Participants will apply this knowledge through practical exercises, allowing them to explore the discussed APIs firsthand.
Additionally, the course examines the most frequent and critical programming flaws within the Java language and platform, addressing both typical errors made by Java developers and issues specific to the language and its environment. Each vulnerability and associated attack is illustrated through clear, understandable exercises, followed by recommended coding guidelines and effective mitigation strategies.
Participants attending this course will
- Grasp the core concepts of security, IT security, and secure coding
- Identify web vulnerabilities beyond the OWASP Top Ten and learn how to prevent them
- Utilize various security features within the Java development environment
- Gain a practical understanding of cryptography
- Recognize typical coding mistakes and learn how to avoid them
- Learn about recent vulnerabilities affecting the Java framework
- Access sources and further reading materials on secure coding practices
Audience
Developers
.NET, C# and ASP.NET Security Development
14 HoursToday, a variety of programming languages can compile code for the .NET and ASP.NET frameworks. While this environment offers powerful tools for security development, developers must understand how to apply architectural and coding-level techniques to implement desired security functions, prevent vulnerabilities, or limit their exploitation.
This course aims to equip developers with practical skills through numerous hands-on exercises. Participants will learn how to prevent untrusted code from executing privileged actions, protect resources via robust authentication and authorization, manage remote procedure calls and sessions, and explore various implementation strategies for specific functionalities, among other topics.
The introduction to vulnerabilities begins by examining typical programming errors made when using .NET. The discussion on ASP.NET vulnerabilities covers various environment settings and their impacts. Furthermore, the course addresses ASP.NET-specific security challenges, including general web application issues and specialized attack vectors such as ViewState attacks and string termination attacks.
Participants in this course will
- Grasp fundamental concepts of security, IT security, and secure coding
- Identify web vulnerabilities beyond the OWASP Top Ten and learn how to mitigate them
- Master the use of various security features within the .NET development environment
- Acquire practical knowledge for utilizing security testing tools
- Understand common coding mistakes and strategies to avoid them
- Gain insight into recent vulnerabilities affecting .NET and ASP.NET
- Access resources and further reading materials on secure coding practices
Audience
Developers
The Secure Coding Landscape
14 HoursThis course introduces key security concepts, providing an overview of vulnerabilities across different programming languages and platforms, and explains how to manage risks associated with software security throughout the software development lifecycle. While not delving too deeply into technical details, it highlights some of the most significant and prevalent vulnerabilities in various software development technologies. The course also addresses the challenges of security testing, presenting techniques and tools that can help identify issues in your code.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding
- Comprehend web vulnerabilities on both server and client sides
- Recognize the serious consequences of improper buffer handling
- Become informed about recent vulnerabilities in development environments and frameworks
- Learn about common coding mistakes and how to avoid them
- Understand security testing approaches and methodologies
Audience
Managers
Secure coding in PHP
21 HoursThis course equips PHP developers with the essential skills needed to build applications resilient against modern internet-based threats. Through PHP-centric examples that extend beyond the OWASP Top Ten, the curriculum covers a wide array of injection attacks, script injections, vulnerabilities in PHP session handling, insecure direct object references, file upload issues, and more. PHP-specific vulnerabilities are categorized into standard types such as missing or improper input validation, flawed error and exception handling, misuse of security features, and time- and state-related problems. Regarding the latter, we examine attacks such as open_basedir circumvention, denial-of-service via magic floats, and hash table collision attacks. In each scenario, participants will learn the critical techniques and functions required to mitigate these risks.
A significant emphasis is placed on client-side security, addressing issues related to JavaScript, Ajax, and HTML5. The course introduces several PHP security extensions, including hash, mcrypt, and OpenSSL for cryptography, as well as Ctype, ext/filter, and HTML Purifier for input validation. Best practices for hardening PHP configuration (php.ini settings), Apache, and the broader server environment are also detailed. Finally, an overview of various security testing tools and techniques available to developers and testers is provided, including security scanners, penetration testing tools, exploit kits, sniffers, proxy servers, fuzzing tools, and static source code analyzers.
Both the introduction of vulnerabilities and configuration best practices are reinforced with hands-on exercises. These demonstrations illustrate the impact of successful attacks, show how to apply mitigation strategies, and introduce the use of various extensions and tools.
Participants completing this course will be able to:
- Grasp the fundamental concepts of security, IT security, and secure coding.
- Identify web vulnerabilities beyond the OWASP Top Ten and understand how to prevent them.
- Recognize client-side vulnerabilities and apply secure coding practices.
- Develop a practical understanding of cryptography.
- Utilize various built-in security features of PHP.
- Identify typical coding errors and learn how to avoid them.
- Stay informed about recent vulnerabilities affecting the PHP framework.
- Gain practical experience in using security testing tools.
- Access resources and further reading on secure coding practices.
Audience
Developers
Microsoft SDL Core
14 HoursThe Combined SDL Core training offers an in-depth look at secure software design, development, and testing through the Microsoft Secure Development Lifecycle (SDL). It provides a Level 100 overview of the fundamental building blocks of SDL, followed by design techniques to help detect and fix flaws in the early stages of the development process.
Focusing on the development phase, the course provides an overview of typical security-relevant programming bugs in both managed and native code. Attack methods are presented for the discussed vulnerabilities, along with associated mitigation techniques. These concepts are explored through a series of hands-on exercises that offer practical, real-world hacking scenarios for participants. An introduction to various security testing methods is followed by demonstrations of the effectiveness of different testing tools. Participants gain a deeper understanding of how these tools operate by applying them to previously discussed vulnerable code through practical exercises.
Participants attending this course will
Understand basic concepts of security, IT security, and secure coding
Become familiar with the essential steps of the Microsoft Secure Development Lifecycle
Learn secure design and development practices
Learn about secure implementation principles
Understand security testing methodology
- Obtain sources and further reading materials on secure coding practices
Audience
Developers, Managers
Security Testing
14 HoursOnce participants have gained familiarity with various vulnerabilities and attack vectors, they will explore the general approach and methodology for security testing, along with the techniques used to uncover specific weaknesses. Security testing begins with information gathering about the system (the Target of Evaluation), followed by comprehensive threat modeling to identify and prioritize all potential threats, ultimately leading to a risk analysis-driven test plan.
Security assessments can occur at multiple stages of the Software Development Life Cycle (SDLC). This course covers design and code reviews, reconnaissance, system information gathering, implementation testing, and environment hardening for secure deployment. Detailed discussions include techniques such as taint analysis, heuristic-based code review, static code analysis, dynamic web vulnerability testing, and fuzzing. Participants will be introduced to various tools that automate the security evaluation of software products. These concepts are reinforced through hands-on exercises where learners execute these tools to analyze previously discussed vulnerable code. Additionally, real-life case studies are provided to deepen the understanding of different vulnerabilities.
This course equips testers and QA personnel with the ability to effectively plan and execute security tests, select and utilize the most suitable tools and techniques to identify even concealed security flaws, and acquire essential practical skills applicable to their daily work.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding
- Gain knowledge of web vulnerabilities beyond the OWASP Top Ten and learn how to prevent them
- Understand client-side vulnerabilities and secure coding practices
- Comprehend security testing approaches and methodologies
- Acquire practical skills in using security testing techniques and tools
- Access resources and further reading materials on secure coding practices
Audience
Developers, Testers
DevOps Security: Creating a DevOps Security Strategy
7 HoursIn this instructor-led live course held in Norway, participants will learn how to formulate an appropriate security strategy to address the security challenges inherent in DevOps practices.
EC-Council Certified DevSecOps Engineer (ECDE)
28 HoursThe EC-Council Certified DevSecOps Engineer (ECDE) programme is a practical course designed to empower professionals with the expertise needed to integrate security throughout the DevOps lifecycle, ensuring robust software development from initial planning to final deployment.
This instructor-led live training, available both online and onsite, targets intermediate-level software and DevOps professionals seeking to embed security practices within CI/CD pipelines, thereby guaranteeing the delivery of secure and compliant code.
Upon completion of this training, participants will be equipped to:
- Comprehend the core principles and practices of DevSecOps.
- Secure all stages of the CI/CD pipeline through the utilization of automated tools.
- Apply secure coding methodologies and conduct vulnerability scans.
- Prepare for the ECDE certification by engaging in practical labs and review sessions.
Course Format
- Interactive lectures and discussions.
- Hands-on experimentation with DevSecOps tools within simulated pipelines.
- Guided exercises centred on secure development and deployment processes.
Customization Options
- For tailored training aligned with your team’s specific workflows or toolchain, please reach out to us to make arrangements.
How to Write Secure Code
35 HoursThis course aims to assist with the following:
- Help developers to master the techniques of writing secure code
- Help software testers to test the security of the application before publishing to the production environment
- Help software architects to understand the risks surrounding the applications
- Help team leaders to set the security baselines for the developers
- Help web masters to configure the servers to avoid misconfigurations
Secure Developer Java (Inc OWASP)
21 HoursThis course provides an in-depth exploration of secure coding principles for Java, utilizing the testing framework established by the Open Web Application Security Project (OWASP). The Open Web Application Security Project is a global online community dedicated to producing freely available resources, including articles, methodologies, documentation, tools, and technologies, aimed at enhancing web application security.
Secure Developer .NET (Inc OWASP)
21 HoursThis course delves into secure coding concepts and principles for ASP.NET, utilizing the testing methodology of the Open Web Application Security Project (OWASP). OWASP is a vibrant online community that provides freely available articles, methodologies, documentation, tools, and technologies dedicated to web application security.
The course examines the security features of the .NET Framework and demonstrates how to safeguard web applications effectively.