PRE-REQUISITE
Secure source code review is essential for identifying vulnerabilities in modern software applications. The course requires a thorough analysis of code to detect and address security flaws effectively. This is a hands-on training course, and participants must bring their own laptops to perform various attacks on web-based applications.
PARTICIPANT'S REQUIREMENTS
-
Windows/Linux/macOS installed on the machine
-
Minimum 8GB of RAM
-
At least 10GB of free disk space
-
VMware Player or VirtualBox installed
WHO SHOULD ATTEND
This course is designed for:
-
Individuals with a basic understanding of application security.
-
Developers with foundational coding knowledge.
-
Professionals interested in performing manual secure source code reviews
-
Developers seeking to secure their applications
-
Anyone looking to learn secure coding practices
-
Those who wish to explore different source code review methodologies and approaches
WHAT TO EXPECT
-
Exposure to modern tools and techniques for secure source code review
-
Access to updated demo applications for hands-on secure code review
-
Interactive secure coding CTF (Capture the Flag) challenges, reflecting the latest security trends
WHAT NOT TO EXPECT
The use of any commercial or proprietary tools.
DURATION
Duration: 3 days
This course covers essential and up-to-date application security issues, with a focus on designing and developing secure code in response to current threats.