Page 1

Secure Coding Tech Bootcamp The Secure Coding Bootcamp is designed for programmers and IT managers that want to learn pioneering development techniques and methodologies to develop an immune system for their code. This 40-hours and on-site program will prepare you to create secure software from the very first stages of the design. You will study the complete development cycle and cover all types of errors depending on the nature of the application (Web/Native). This unique methodology will showcase defensive and offensive techniques that will immerse you in the attacker’s point of view. Backed by IMMUNE Tech Institute, this bootcamp unites top corporate professors who bring up-to-date cases and a practical approach that will allow you to implement theory from the very first day.

Description:

Academic design:

Course Skills:

Format: Bootcamp Location: IMMUNE Campus Madrid, Spain Language: classes in Spanish, materials in English

PROGRAM DIRECTOR:

In this course you will:

Duration: 4 weeks Hours: 40 hours (10 hours per week) Friday: 17h - 22h Saturday: 10h - 15h Home hours: 3 hours per week

What is IMMUNE IMMUNE Coding Institute is a learning and innovation community at the forefront of technology training, that convenes a team of passionate and action-oriented teachers, trainers and other professionals. IMMUNE has a unique learning model, that includes partnering with corporations in order to work on real-business tasks, and to apply the resulting knowledge at the workplace. At IMMUNE students learn how they can shift the future of everything by understanding different technologies and accelerating their use.

Joanna Filipiak

·

Understand the possible errors made during the development cycle

·

Learn defensive and offensive techniques

·

Learn how to automate security analysis

·

Develop a complete application on which to test and apply all the techniques of the course

·

Become an expert of methodologies of secure development, or SecDevOps.

Banco Santander

BOOTCAMPS DIRECTOR: Oscar Delgado Immune Academic Director PhD Director of Master in Blockchain and Criptoeconomy UAM. CTO Noisy

Why IMMUNE TOP CORPORATE PARTNERSHIPS

TECH PRACTICAL APPROACH

Access the most in-demand jobs and companies in our network.

Learn naturally from hands-on experience, using the latest technologies with a ground-breaking methodology.

HUMAN SCIENCES & SOFT SKILLS

VIBRANT ENVIRONMENT

Apply technology to build high-impact solutions for our lives. Grow by developing your soft skills.

Seize exponential opportunities in a creative, collaborative and fast-growing community.


Study Plan MODULE DESCRIPTION 1. BASIC CONCEPTS 5 Hrs

2. CRYPTOGRAPHY FOR SECURE DEVELOPMENT 10 Hrs

3. SECURITY IN THE DESIGN PHASE 8 Hrs

4. SECURITY IN THE CODING PHASE 27 Hrs

Module 1 introduces the need for safe programming, and the disastrous consequences of its absence. OWASP, and other secure development guides will be presented. Finally, the first security guidelines and rules will be introduced.

Many software failures are related to the misuse, or total absence, of cryptographic primitives. This module studies the necessary elements, always from a practical point of view and applied to the problems usually solved with its use.

This module addresses one of the objectives of the programme: the idea that safety should be included in the software lifecycle as soon as possible. To this end, the concept of SecDevOps will be introduced, and how to integrate security at each stage of development will be studied.

The fourth module deals with the main errors that are usually made in the coding phase, both for native and Web applications. Likewise, different analysis tools will be studied, which help to partially automate the analysis of code, in a static way (analysing the source code) and dynamic way (analysing the behaviour of the application in execution).

SUBJECTS

CASE STUDY

1.1. Types of software faults

Develop your App

1.2. Standard methodologies: OWASP, ASVS

First stage of the Personal Project Design

1.3. Golden Rules of Code Security 2.1. Encryption: symmetric, asymmetric, digital signature 2.2. Multi- factor authentication (MFA)

Develop your App | phase 2 Second stage of your project in which you’ll apply symmetric, asymmetric, PKI and key establishment (DH) encryptions.

2.3. Secure Credential Management and Storage

Then, you will create a dual factor password and its storage.

Develop your App | phase 3 3.1. Security in the life cycle: agile methodologies

Integrated with agile product

3.2. Threat modelling and tools

Security-by-Design using the

development methodologies, you will apply the threat modeling following tools: OWASP ZAP, Cucumber, BDD Security

4.1. Native applications: buffer overflow 4.2. Web applications defence and attack 4.3. Cloud security (AWS, OWASP Cloud) 4.4. API REST design and implementation 4.5 Mobile apps security

Develop your App | phase 4 Depending on the nature of your project you will apply static and dynamic tools and prepare your final product for a real attack test and a presentation to a panel of

4.6.Dynamic and static analysis: tools

security experts.

Faculty Bootcamps Academic Director

Program Director

Oscar Delgado

Joanna Filipiak

IMMUNE Academic Director

Cybersecurity Manager Banco Santander

PhD Director of Master in Blockchain and Criptoeconomy - UAM. CTO Noisy

Isabella Fernández

Contact www.immune.institute Paseo de la Castellana 89, Madrid, Spain

Admissions @: isabella.fernandez@immune.institute Call: 911 011 640 WhatsApp: 644 420 272

https://immune.institute/apply

Profile for IMMUNE Technology Institute

Secure Coding - About the Program  

Secure Coding - About the Program