Web & API Security Training
This training provides comprehensive knowledge on the secure design, implementation, and testing of web applications. Participants learn how to better assess the security of their software and how to implement appropriate measures and activities in practice. We draw on our own experience in software development projects, enabling us to share realistic best practices.
At a glance
General information
- 2 days
- On-site or remote
- Language: English or German
- Includes lab access for independent hacking during and up to 4 weeks after training
Target group
Web application developers (front-end/back-end/DevOps)
Application examples
- Creating understanding of vulnerabilities and countermeasures in web applications
- Providing methodology for systematic threat modeling
Description
With the increasing importance of software systems for digital business models, the threats to which these systems are exposed are also growing. If security aspects are neglected or not taken into account from the outset, it is often only a matter of time before this leads to problems. In addition to actual vulnerabilities, attacks, and data loss, image problems caused by negative publicity and the associated loss of trust are also a serious risk for systems and companies.
This training provides comprehensive knowledge on the secure design, implementation, and testing of web applications. Participants learn how to better assess the security of their software and how to implement appropriate measures and activities in practice. We draw on our own experience in software development projects and can thus share realistic best practices.
We offer both public training courses on fixed dates and individual training courses with customizable focus areas.
Agenda
- Introduction: Secure Web Applications
- Threat Modelling
- Threat analysis for methodical security
Frameworks and methods
Integration into development processes
- Threat analysis for methodical security
- Secure Coding Principles
- Principles for secure system design
- Best practices for input validation, authentication, and authorization
- Vulnerabilities in web applications
- The 10 most common vulnerabilities in web applications
- Identifying vulnerabilities and appropriate countermeasures
- Guided hacking of a deliberately vulnerable web application
- Security Tests
- Types of security tests, test tooling
- Strengths and weaknesses
- Evaluation of findings (vulnerability analysis)
Typical questions we answer:
- How can software developers identify and assess threats and risks to their software?
- What security requirements should be considered when developing software, and how can they be implemented?
- What are the best practices for implementing web applications, for example with regard to authentication, authorization, or input validation?
- How can a web application be checked for security vulnerabilities?
- signed certificate of participation
- experienced trainers
- small training groups
Trainers
Our trainers are field-tested experts in their areas of expertise. Through their work in projects, they expand their knowledge day by day and pass on this know-how in their trainings - application-oriented and practice-oriented.
Michael Fuchs
Why inovex Academy?
Our offerThe inovex Academy has set itself the task of passing on knowledge about methods and technologies that we already use successfully in our projects.
Exchange experiences
In our open training courses, we attach great importance to the exchange of experience among like-minded people. Learn from and with other experts.
Curated content
All training content is carefully selected to achieve the best possible learning effect and to convey as much content as possible.
Individual Assistance
Our trainers come from a practical background and have already tested and successfully applied many of the contents taught in their daily work.
Customized flight altitude
Our training courses start where many standard courses end. Thanks to their interactive structure, we dynamically adapt the level to the participants' expert knowledge and are happy to delve deeply into complex issues.
Upcoming trainings
09:00–17:00 (Munich)
09:00–17:00 (Munich)
09:00–17:00 (remote)
09:00–17:00 (remote)
09:00–17:00 (remote)
09:00–17:00 (remote)
09:00–17:00 (Hamburg)
09:00–17:00 (Hamburg)
09:00–17:00 (Cologne)
09:00–17:00 (Cologne)
Supplementary information
Collin Rogowski
Head of inovex Academy