Secure Development (accès Code Bashing pendant 1 an en option) (Live Virtual Class)

Blended learning

Who is the training for?

All public

Duration

2,00 day(s)

Language(s) of service

EN FR

Goals

Formation mise à jour régulièrement!

  • Discover the offensive side of the Application Security about Web Application and practice it during a lab.
  • Discover the offensive side of the Application Security about Mobile Application and practice it during a lab.
  • Introduce the students to the defensive side of the Application Security.
  • Present to the students different kinds of application vulnerabilities.

Contents

Introduction to the Web Application Vulnerability Assessment & Introduction to the Mobile Application Vulnerability Assessment
  • Training identity card:
    • Type: Labs
    • Audience: Everyone that have already developed web applications
    • Technology: Web technologies
  • During this training, the students will discover:
    • What is a Web Application Vulnerability Assessment?
    • The different steps of this kind of assessment
    • The methodology used to rate the security issues
    • The open referential that can be used to conduct an assessment
Introduction to the Mobile Application Vulnerability Assessment
  • Training identity card:
    • Type: Labs
    • Audience: Everyone that have already developed mobile applications
    • Technology: Mobile technologies
  • During this training, the students will discover:
    • What is a Mobile Application Vulnerability Assessment?
    • The different steps of this kind of assessment
    • The methodology used to rate the security issues
    • The open referential that can be used to conduct an assessment
Introduction to Secure Coding
  • Training identity card:
    • Type: Theoretical
    • Audience: Everyone
    • Technology: Independent
  • During this training, the students will discover:
    • What is the Application Security?
    • Why the security of an application is important for is life in the company information system?
    • Principles of Secure Coding
    • Common security error meet during development and how to prevent them
Practical demonstrations of common vulnerabilities
  • Training identity card:
    • Type: Demonstration
    • Audience: All developers
    • Technology: Independent
  • During this training, the students will discover:
    • Different kind of vulnerabilities that are commonly present in applications
    • How to detect them
    • How to validate them
    • How to fix them

Certificate, diploma

Une attestation de participation sera transmise aux participants

Organization contact details

Nathalie Thielemans / Nassera Aici

These courses might interest you

EN
Day
Computer science - Computerisation - Computer project management