This course is built as a detailed description with hands-on experience of today’s most common vulnerabilities: from OWASP Top-10 2021. Trainees will learn methods of static (including SAST) and dynamic (including DAST) identification and the reliable elimination of such vulnerabilities.
To be determined
This course has been developed by experts having over eight years of practical experience in Application Security. The knowledge to be transferred to trainees has been time and again tested in the field and forms a basis for safe application development. It offers a detailed description with hands-on experience of today’s most common vulnerabilities: from OWASP Top-10 2021.
Trainees will learn methods of static (including SAST) and dynamic (including DAST) identification and the reliable elimination of such vulnerabilities. They will also be provided with examples of code in various programming languages containing vulnerabilities, as well as “live” applications, which will help better understand the nature of vulnerabilities (and learn how to find them).
The course includes numerous practical tasks and exit tests to check the acquired knowledge.This course is built as a detailed description with hands-on experience of today’s most common vulnerabilities: from OWASP Top-10 2021. Trainees will learn methods of static (including SAST) and dynamic (including DAST) identification and the reliable elimination of such vulnerabilities.
Upon completion of training, students will be able to avoid vulnerabilities of OWASP Top-10 and identify them using static and dynamic methods in the existing code/configuration.
Middle+ Developers, Middle+ QA, Junior Security Engineers, and Web Application Architects.
Participants must be able to work with web browsers, read and write code for modern web applications, and understand the main principles of their operation: HTTP, Cookies, Proxies, etc.