• English
  • Mon - Fri 8.00 - 18.00
  • 5 rue Goell L-5326 Contern
  • + 352 26 20 39 64
Excellium University
  • Home
  • Сourses
    • Data Privacy
    • Hacking & Forensics
    • Security Management
    • Security Product
    • Application Security
    • Security Awareness
  • About Us
    • All instructors
  • Contact Us
  • Blog
  • Home
  • Сourses
    • Data Privacy
    • Hacking & Forensics
    • Security Management
    • Security Product
    • Application Security
    • Security Awareness
  • About Us
    • All instructors
  • Contact Us
  • Blog

Secure Development

Teachers
Julien EHRHART
Category:
APPLICATION SECURITY /
Free
appsec

Free

Duration: 2 days/module

DATE :

On-demand.

COURSE DESCRIPTION

1st day:

Introduction to the Web Application Vulnerability Assessment & Introduction to the Mobile Application Vulnerability Assessment

 

Training identity card:

  • Type: Labs;
  • Audience: Everyone that have already developed web applications;
  • Technology: Web technologies.

 

Objective:

The objective of this training is to allow the students to discover the offensive side of the Application Security about Web Application and practice it during a lab.

 

What the students will learn:

During this training, the students will discover:

  • What is a Web Application Vulnerability Assessment?
  • The different steps of this kind of assessment;
  • The methodology used to rate the security issues;
  • The open referential that can be used to conduct an assessment.

 

Introduction to the Mobile Application Vulnerability Assessment

 

Training identity card:

  • Type: Labs;
  • Audience: Everyone that have already developed mobile applications;
  • Technology: Mobile technologies.

 

Objective:

The objective of this training is to allow the students to discover the offensive side of the Application Security about Mobile Application and practice it during a lab.

 

What the students will learn:

During this training, the students will discover:

  • What is a Mobile Application Vulnerability Assessment?
  • The different steps of this kind of assessment;
  • The methodology used to rate the security issues;
  • The open referential that can be used to conduct an assessment.

COURSE DESCRIPTION

2nd day:

 

  • Introduction to Secure coding
  • Practical demonstrations of common vulnerabilities

 

Introduction to Secure Coding

 

Training identity card:

  • Type: Theoretical;
  • Audience: Everyone;
  • Technology: Independent.

 

Objective:

The objective of this training is to introduce the students to the defensive side of the Application Security.

 

What the students will learn:

During this training, the students will discover:

  • What is the Application Security?
  • Why the security of an application is important for is life in the company information system?
  • Principles of Secure Coding;
  • Common security error meet during development and how to prevent them.

 

Practical demonstrations of common vulnerabilities

 

Training identity card:

  • Type: Demonstration;
  • Audience: All developers;
  • Technology: Independent.

 

Objective:

The objective of this training is to present to the students different kinds of application vulnerabilities.

 

What the students will learn:

During this training, the students will discover:

  • Different kind of vulnerabilities that are commonly present in applications;
  • How to detect them;
  • How to validate them;
  • How to fix them;
CONTACT

About Instructors

Julien EHRHART

Free

Duration: 2 days/module

Contact

  • Excellium : 5 rue Goell L-5326 Contern or Oxiane 20, rue de l’Industrie – L – 8399 Windhof (Koerich)
  • +352 26 20 39 64 or Oxiane +352 27 39 35 1
  • training@excellium-services.com
Copyright © 2017 Excellium University
Mentions légales
Privacy Statement
  • Home
  • About Us
  • Courses
  • Contact Us
  • Blog
Search