Secure coding is not extra overhead. It’s just about coding differently, something that does not add to the existing development time. This course focusses on changing coding habits: transforming developers into motivated secure coders.
This training does not just discuss theory. Rather, it contains lots of practices that you can apply the next working day. Our approach consists of four didactical steps:
This course will change the way you look at your C/C++ code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and – more importantly – best practices you can apply to protect yourself. We give you a holistic view on C/C++ programming mistakes and their countermeasures from the machine code level to virtual functions and OS memory management. We present the entire course through live practical exercises to keep it engaging and fun.
Writing secure code will give you a distinct edge over your competitors. It is your choice to be ahead of the pack – take a step and be a game-changer in the fight against cybercrime.
This classroom trainings comes with a number of easy-to-understand exercises providing live hacki...
This classroom trainings comes with a number of easy-to-understand exercises providing live hacking fun. By accomplishing these exercises with the lead of the trainer, participants can analyze vulnerable code snippets and commit attacks against them in order to fully understand the root causes of certain security problems. All exercises are prepared in a plug-and-play manner by using a pre-set desktop virtual machine, which provides a uniform development environment.
After successful completion of the course, participants will be able to understand basic concepts of security, IT security and secure coding. They will realize the severe consequences of unsecure buffer handling and understand the architectural protection techniques and their weaknesses.
This course gives participants a practical understanding of cryptography, an understanding of essential security protocols, XML security and typical coding mistakes and how to avoid them. They will be informed about recent vulnerabilities in various platforms, frameworks and libraries and get sources and further readings on secure coding practices.
Advanced C and C++ developers, software architects and testers who are aware of the importance of...
Advanced C and C++ developers, software architects and testers who are aware of the importance of software security, and want to improve their understanding of vulnarabilities in their designs and code and want to learn how to avoid them.
After attending this training, participants will receive a HTI certificate. ...
After attending this training, participants will receive a HTI certificate.
Writing .NET web applications can be rather complex – reasons range from dealing with legacy technologies or underdocumented third-party components to sharp deadlines and code maintainability.
Read more →
Writing web applications in Java can be rather complex – reasons range from dealing with legacy technologies or underdocumented third-party components to sharp deadlines and code maintainability.
Read more →