Learn to build security into your applications from the ground up with three days of expert tuition and practical exercises from industry-leading security specialists. By placing you into the shoes of a hacker, this course will give you a new perspective on software development and enable you to produce more secure systems.
What our Customers Say
"I found the course really interesting and I thought it had a great theory/practical balance. I feel like I’ve definitely come away with a much-improved understanding of what sort of things I need to be considering when architecting and developing new applications. Thanks for sharing that knowledge with us."
Over the three days you will learn how hackers analyse and probe applications to identify and exploit vulnerabilities. You will be taught to recognise and avoid weaknesses and have ample opportunity to ask questions and learn from a software security specialist.
Our practical exercises give you a chance to practice the hacking techniques covered in the course and help you to consolidate this new knowledge to ensure you come away more capable of building secure software.
The three-day training course includes in-depth coverage of the following topics:
- The hacker's perspective
- Assessing the attack surface
- Logging in without permission
- Accessing data belonging to others
- Fuzzing for weaknesses
- Stealing data from a database
- Attacking the server
- Serialized and marshalled data
- Attacking other users
- Exploiting flawed logic
Who is this Course for?
This course is intended for software developers, particularly those building applications that operate over the web (HTTP/HTTPS) – for example: websites, software-as-a-service solutions, and mobile applications.
We also provide training courses designed for software testing and QA teams to support them in identifying weaknesses in your applications, along with bespoke developer training tailored to the type of work your team does. Contact us at firstname.lastname@example.org to discuss your training needs.
- Three days of expert tuition from industry-leading IT security specialists
- Breakfast, lunch, and refreshments on all three days
- A copy of the training materials and practical exercises to take away
- A certificate of achievement
- Future access to updated course materials
- Discounted refresher training sessions
Book early for Discounted Rates!
Want to know more?
Get in touch with Cognitous at email@example.com to find out more about our training.