Developer Training Program Aligned to OWASP Security Requirements
101001001001010101010 101010010101010010101 100010101010101110100 001010110100010101001 010001111010101011010 111010111000110101010 101001001001010101010 001010101010111010101 101010010101010010101 001010100000101001010 100010101010101110100 001010110100010101001 010001111010101011010 111010111000110101010 001010101010111010101 001010100000101001010
THE CHALLENGE As cyber security attacks continue to increase, developers need to implement the concepts and aspects of building secure software with the shift from monolithic server-side code to a complete paradigm shift to functional programming, server-less API, mobile, cloud, containers, federation and more.
The reality is modern applications are designed differently; therefore, the certification classes and training need to shift from the traditional paradigm to a more modern one that focuses on the guidance from the Open Web Application Security Project (OWASP) and also incorporates the National Institute of Standards and Technology (NIST) 800-63 Authentication and Session Management.
THE SOLUTION OWASP Requirement
Learning Tree Training Aligned to OWASP Requirements
1. Injection Attacks 7. C ross-Site Scripting
Fundamentals of Secure Application Development Course 2 Days Instructor-Led
Key Course Benefits & Real-World Results From proactive requirements to coding and testing, this secure software development training course covers best practices any software developer needs to avoid opening up their users, customers and organization to attack at the application layer. Courses designed to educate professional programmers on the skills necessary to develop and deploy secure applications. You will learn about potential security issues through concrete, hands-on examples of vulnerable code.
ecure Coding for Java Course S 3 Days Instructor-Led All OWASP Ten Covered
oding for PHP Course C 3 Days Instructor-Led Secure Coding in C Course 3 Days Instructor-Led
Key practical learning from these courses: • Which poor programming practices lead to vulnerable code, how to code securely and how to maintain secure development practices throughout the SDLC. • Sharpen skills and gain experience in applying secure design and implementation principles through demonstrations of building, testing and securing real-world applications. • The opportunity to participate in securing and testing applications through a progression of “challenge scenarios” alternating assignments as “attackers” and “defenders” of applications. Common web application exposures and attacks (including those in the OWASP Top Ten).
OWASP TOP 5
OWASP Top 10: Risks One Through Five Course On Demand Only – 215 hours
This course teaches you the first 5 of the Top 10 in the OWASP list, you will examine: • Injection Attacks • XML External Entities (XXE) • Broken Authentication • Broken Access Control • Sensitive Data Exposure Continued on next page
1-512-635-3442 | LearningTree.com/Evolve