Secure Coding Tech Bootcamp The Secure Coding Bootcamp is designed for programmers and IT managers that want to learn pioneering development techniques and methodologies to develop an immune system for their code. This 40-hours and on-site program will prepare you to create secure software from the very ﬁrst stages of the design. You will study the complete development cycle and cover all types of errors depending on the nature of the application (Web/Native). This unique methodology will showcase defensive and offensive techniques that will immerse you in the attacker’s point of view. Backed by IMMUNE Tech Institute, this bootcamp unites top corporate professors who bring up-to-date cases and a practical approach that will allow you to implement theory from the very ﬁrst day.
Format: Bootcamp Location: IMMUNE Campus Madrid, Spain Language: classes in Spanish, materials in English
In this course you will:
Duration: 4 weeks Hours: 40 hours (10 hours per week) Friday: 17h - 22h Saturday: 10h - 15h Home hours: 3 hours per week
What is IMMUNE IMMUNE Coding Institute is a learning and innovation community at the forefront of technology training, that convenes a team of passionate and action-oriented teachers, trainers and other professionals. IMMUNE has a unique learning model, that includes partnering with corporations in order to work on real-business tasks, and to apply the resulting knowledge at the workplace. At IMMUNE students learn how they can shift the future of everything by understanding different technologies and accelerating their use.
Understand the possible errors made during the development cycle
Learn defensive and offensive techniques
Learn how to automate security analysis
Develop a complete application on which to test and apply all the techniques of the course
Become an expert of methodologies of secure development, or SecDevOps.
BOOTCAMPS DIRECTOR: Oscar Delgado Immune Academic Director PhD Director of Master in Blockchain and Criptoeconomy UAM. CTO Noisy
Why IMMUNE TOP CORPORATE PARTNERSHIPS
TECH PRACTICAL APPROACH
Access the most in-demand jobs and companies in our network.
Learn naturally from hands-on experience, using the latest technologies with a ground-breaking methodology.
HUMAN SCIENCES & SOFT SKILLS
Apply technology to build high-impact solutions for our lives. Grow by developing your soft skills.
Seize exponential opportunities in a creative, collaborative and fast-growing community.
Study Plan MODULE DESCRIPTION 1. BASIC CONCEPTS 5 Hrs
2. CRYPTOGRAPHY FOR SECURE DEVELOPMENT 10 Hrs
3. SECURITY IN THE DESIGN PHASE 8 Hrs
4. SECURITY IN THE CODING PHASE 27 Hrs
Module 1 introduces the need for safe programming, and the disastrous consequences of its absence. OWASP, and other secure development guides will be presented. Finally, the ﬁrst security guidelines and rules will be introduced.
Many software failures are related to the misuse, or total absence, of cryptographic primitives. This module studies the necessary elements, always from a practical point of view and applied to the problems usually solved with its use.
This module addresses one of the objectives of the programme: the idea that safety should be included in the software lifecycle as soon as possible. To this end, the concept of SecDevOps will be introduced, and how to integrate security at each stage of development will be studied.
The fourth module deals with the main errors that are usually made in the coding phase, both for native and Web applications. Likewise, different analysis tools will be studied, which help to partially automate the analysis of code, in a static way (analysing the source code) and dynamic way (analysing the behaviour of the application in execution).
1.1. Types of software faults
Develop your App
1.2. Standard methodologies: OWASP, ASVS
First stage of the Personal Project Design
1.3. Golden Rules of Code Security 2.1. Encryption: symmetric, asymmetric, digital signature 2.2. Multi- factor authentication (MFA)
Develop your App | phase 2 Second stage of your project in which you’ll apply symmetric, asymmetric, PKI and key establishment (DH) encryptions.
2.3. Secure Credential Management and Storage
Then, you will create a dual factor password and its storage.
Develop your App | phase 3 3.1. Security in the life cycle: agile methodologies
Integrated with agile product
3.2. Threat modelling and tools
Security-by-Design using the
development methodologies, you will apply the threat modeling following tools: OWASP ZAP, Cucumber, BDD Security
4.1. Native applications: buffer overﬂow 4.2. Web applications defence and attack 4.3. Cloud security (AWS, OWASP Cloud) 4.4. API REST design and implementation 4.5 Mobile apps security
Develop your App | phase 4 Depending on the nature of your project you will apply static and dynamic tools and prepare your ﬁnal product for a real attack test and a presentation to a panel of
4.6.Dynamic and static analysis: tools
Faculty Bootcamps Academic Director
IMMUNE Academic Director
Cybersecurity Manager Banco Santander
PhD Director of Master in Blockchain and Criptoeconomy - UAM. CTO Noisy
Contact www.immune.institute Paseo de la Castellana 89, Madrid, Spain
Admissions @: email@example.com Call: 911 011 640 WhatsApp: 644 420 272