Course Outline
Part 1. Introduction
Basic concepts
- Safety limit
- Source and sink metaphors
- AppSec kill chain
- Threat modeling
Part 2. Backend
Backend Overview
- Assets and Attack Vectors
- Backend Threat Model
Application boundary
- Frontline Review
- Authentication and authorization
- Session management
- Input Validation
Database boundary
- Frontline Review
- SQL injection
- NoSQL injection
Operating system boundary
- Frontline Review
- Memory security
- Command injection
- Path traversal
- The pros and cons of uploading files
- XML external entity reference
- Deserialize
Part 3. Frontend
Frontend Overview
- The Tragedy of Cookies
- Single Origin Policy
- JavaScript
- Frontend Threat Model
Origin boundary
- Frontline Review
- Cross site scripting
- Cross-site request forgery
- Cross site leaks
- Other problems
Part 4. The Big Questions
How to keep a secret?
- Secrets Management
- Sensitive data management
How to ensure code and data integrity?
- Supply Chain Attacks
- Cache poisoning
How to maintain availability?
- On the importance of keeping a diary
- Self-healing systems
- Surviving disasters
- Surviving Volume Attacks
Delivery Options
Private Group Training
Our identity is rooted in delivering exactly what our clients need.
- Pre-course call with your trainer
- Customisation of the learning experience to achieve your goals -
- Bespoke outlines
- Practical hands-on exercises containing data / scenarios recognisable to the learners
- Training scheduled on a date of your choice
- Delivered online, onsite/classroom or hybrid by experts sharing real world experience
Private Group Prices RRP from £3800 online delivery, based on a group of 2 delegates, £1200 per additional delegate (excludes any certification / exam costs). We recommend a maximum group size of 12 for most learning events.
Contact us for an exact quote and to hear our latest promotions
Public Training
Please see our public courses
Testimonials (5)
Multiple examples for each module and great knowledge of the trainer.
Sebastian - BRD
Course - Secure Developer Java (Inc OWASP)
Module3 Applications Attacks and Exploits, XSS, SQL injection Module4 Servers Attacks and Exploits, DOS, BOF
Tshifhiwa - Vodacom
Course - How to Write Secure Code
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
The trainer's subject knowledge was excellent, and the way the sessions were set out so that the audience could follow along with the demonstrations really helped to cement that knowledge, compared to just sitting and listening.
Jack Allan - RSM UK Management Ltd.
Course - Secure Developer .NET (Inc OWASP)
Nothing it was perfect.