Developer
There’s a web application for most parts of our Internet lives and to a degree, our daily lives. With this large surface area, there’s no doubt that they are often the entry point for most breaches. If you look at some of the biggest hacks in the last 18 months, the compromises can be largely attributed to flaws in a web applications.
Course outline
Continual learning and investment
By using world-class, highly skilled penetration testing and security assessement consultants who are also proficient in training, we are able to draw on our extensive real-world experiences and provide a range of courses for competent penetration testers through to newcomers entering the field
Red Team/Blue Team
We make use of a red team-blue team training approach when it comes to our Developer training. The class is divided into teams and discuss possible attack-defend scenarios against our custom web applications. Our aim is to help students get into the mind-set of an attacker. A good attacker will disregard rules, so understanding what is possible from an attack helps build a better defensive approach.
Areas Covered
We are staunch followers of two of the Open Web Application Security Project (OWASP) projects: The Developer Guide as well as the Application Security Verification Standard (ASVS). Students will cover:
- Authentication and Authorisation
- Session Management
- Data validation and output validation attacks
- Cryptography
- Client-side Technologies
Our courses are delivered publicly by our training partner Gitex africa. For further information on the next public course. If you wish to have In-house training, please get in touch with our sales team to discuss further.