AppSec for Developers

This is our Specialist course for Appsec Developers and is part of the AppSecOps course.

In this highly interactive 2-Day Intermediate hands-on course delegates will gain an understanding of application security vulnerabilities, how to code with security mindset and threat modelling for "secure by design" development process.

2 day course,2025 Edition

Available by Partners

Live, online available

24 hours post course lab access

Intermediate

Course Overview

Web application security tends to be addressed only when vulnerabilities are found on applications running in production. Addressing these vulnerabilities at that stage becomes an expensive affair. These vulnerabilities arise primarily because developers, leads and architects are not sensitized against their impact and proper fixing/patching

The aim of this class is two-fold:

  • Sensitize development teams about application security vulnerabilities, how to develop with security first mindset and their impact through live exploitation and patching of a vulnerable application.
  • Guide the architects/leads/developers to identify the insecurities in application architecture and to integrate into Agile workflows.

Throughout this class, developers will be able to get on the same page with security professionals, understand their language, learn how to fix or mitigate vulnerabilities learnt during the class and get acquainted with some real-world breaches, for example, “The Equifax” breach in September 2017. Various bug bounty case studies from popular websites like Facebook, Google, Shopify, Paypal, Twitter etc will be discussed explaining the financial repercussions of application security vulnerabilities like SSRF, XXE, SQL Injection, Authentication issues etc.

The application participants will interact with is a shopping cart system built on a microservices architecture and deployed using Docker. These microservices are developed in multiple languages including Java, .NET Core, PHP, Python, NodeJS, HTML, and JavaScript, each containing different vulnerabilities that require patching. The approach is kept generic so that developers from any language background can easily understand and implement the knowledge learned within their own environments.

Using this knowledge, attendees will threat model the application, work in teams to discuss potential threats, and leave with real-world insights and ideas that can be integrated into their SDLC.

Interested

Interested?

1. Our courses are available directly from us; through our training partners or at worldwide technical conferences.

2. You can find course dates and prices on the Courses and Webinars page. Click here for course dates, prices and content

3. Take a look below at a few of the upcoming courses for this specific training.

4. For more information including private course requests, complete the short form below.

Courses and webinars

Booking enquiries

Select the course from the Courses and Webinars Page.

Click here for course dates and prices

For private course delivery enquiries or other information, please use the form alongside.

The course is also available from our partners listed below.

QA training

If booked through Check Point, Cyber-Security Leraning Credits are accepted for this course.

Checkpoint training

For security and IT decision makers

What’s the real impact of training your team through NotSoSecure?

Make your organisation a less attractive target to attackers by building a team that can write code resistant to complex, modern attacks, without losing business functionality and development speed. Trained delegates can:

  • Write secure application code resilient to a variety of web-based attacks in the OWASP top 10.
  • Understand how attackers identify vulnerabilities in code, and the impact of this, so they can adopt more secure ways of working.
  • Identify and mitigate security vulnerabilities earlier on in the development lifecycle.
  • Use a vocabulary of risk and exploitation to work more effectively with security practitioners.
  • Understand the business impact of application security and articulate this to key stakeholders.
  • Take on greater responsibility in the team and become an advocate of security in the wider business.

Course Details

What you will learn

This course teaches STRIDE methodology, by studying several vulnerable application designs and then try to envision how the application can be compromised. Once identified, we deep dive into the example code where the vulnerability exists and then implements the best secure solution to the application. We also run attacks on the vulnerable application using real world hacking tools and techniques to broaden developer mindset.

By the end of the course, you’ll know:

  • Everything you need to do about application security vulnerabilities, including why they occur, how they impact and what risk they pose to the wider organization
  • Threat modelling principles and Defense in depth thinking
  • How to assess the source code to identify the vulnerable pattern
  • How to write effective mitigation against the vulnerability
  • How to manage security requirements for Agile tools
  • How to build and maintain a culture of security across the team using secure practices and tools

What you will be doing

You’ll be learning hands on:

  • Threat modelling a full application one feature/section at a time
  • Brainstorming possible solutions to insecure design
  • Perform attacks on 10+ vulnerabilities using real world tools and live environment
  • Understanding insecure code in applications
  • Fixing these vulnerabilities so you can secure your own application.
  • Discussing the security requirements for application development
  • Competing in a fast-paced Capture the Flag (CTF) game

What you will get:

  • Certificate of completion
  • 24-hour lab access post-course completion (with the opportunity to extend)
  • 8 Continuing Professional Education (CPE) credits awarded per day of training fulfilled
  • Learning pack, including question & answer sheets, setup documents, and command cheat sheets

Why it is relevant

Have you ever developed an application without testing the code for vulnerabilities or shipped software with known security flaws? Software has become a frontline target for cybercriminals who want to disable, disrupt, and destroy systems and harm individuals. And some of the most newsworthy hacks in recent years – including credit reporting agency Equifax, telecommunications giants T-Mobile and Optus, and even the Shanghai Police – have been the result of vulnerabilities in application code. From customer data being stolen, to entire organizations going offline, secure code matters.

There are other reasons to develop your ability too. As security becomes more embedded in the way we work, employers are increasingly looking for development specialists who can demonstrate technical application security skills all the way up to CTO level. Secure coding proficiency directly correlates with your growth and career progression and can lead you into new areas.

This course is packed full of exercises and topics relevant to the current threat landscape and the latest industry-standard development systems and processes. Our syllabuses are also revised regularly to reflect the latest in-the-wild hacks and whatever proof of concepts we’ve been developing through our own research. Because they remain so up to date with the threat landscape and security industry standard, many delegates return every 1-2 years to update their skills and get a refresh.

Course Syllabus

Our syllabuses are updated frequently to reflect new vulnerabilities and exploits.

APPLICATION SECURITY BASICS

  • Why do you need application security?
  • Understanding the OWASP Top 10
  • Threat modelling concepts

DEVELOPER ENVIRONMENT SECURITY

  • Securing code in repositories before commit
  • Securing dependencies
  • Automated code scanning
  • Attacks
    • Phishing

FRONT-END SECURITY

  • What is the HTTP/HTTPS protocol?
  • Understanding requests and responses – attack surface
  • Securing forms and webpages
  • Securing authentication and browser sessions
  • Client-side security headers and their server configurations
  • Attacks
    • Cross Site Scripting
    • Client-side code injection through file upload
    • Session hijacking

BACKEND/API SECURITY

  • Securing Authentication system
  • Understanding popular authorizations mechanism
  • ORM/Model security
  • 3rd party API Integration security
  • Attacks
    • Brute forcing
    • Login bypass
    • Mass assignment
    • Parameter tampering
    • Server-side URL manipulation

DATA SECURITY

  • Securing data at rest and data in transit
  • Cryptography
  • Attacks
    • SQL Injection
    • Insecure deserialization

SECURE FILE HANDLING

  • File upload validations
  • Securing docx and excel file uploads
  • Attacks
    • Remote Code Execution via web shell
    • XXE
    • Insecure Direct Object Reference

SOURCE CODE REVIEW

  • How to validate source code security
  • Walkthrough: How threat actors chain vulnerabilities to achieve greater impact
  • Capture the Flag: a timed competition challenging you to spot flaws in different samples of source code.

THREAT MODELLING

  • How to tackle vulnerabilities in the labs and create a threat list for the vulnerable application
  • How to integrate into your Agile workflow and manage security requirements

Course highlights

What delegates love:

  • Defensive coding:the ability to write code with security focus
  • Offensive angle: you’ll learn from practicing penetration testers and red teamers with up to date, working knowledge of the latest and most common software hacks.
  • Threat modeling:You’ll learn how to assess insecure application design
  • Multiple mitigations:for every vulnerability covered, you’ll explore 3 to 4 remediations, helping you develop a versatile, relevant approach.
  • Focus on awareness and process as well as code: you’ll learn the principles behind the practical approach.
  • Browser based: the course is fast to set up, requiring a single installation of Burp Suite
  • Individual access: you’ll have your own infrastructure to play with, enabling you to try out secure coding and mitigation techniques independently, at your own pace.
  • Real-world learning: in an industry where most of the leading cybersecurity training courses are based on theory, our scenario-led, research-based approach ensures you learn how real threat actors think and act.

Outcomes for budget holders

This course is designed to help organizations upskill their development team in response to evolving cyber risk, helping senior decision makers:

  • Create security requirements for projects that in planning phase using Threat modelling
  • Manage the likelihood and impact of security incidents originating from insecure code and development practices
  • Lower the cost of retrofitting security into existing applications and workflows and totally eradicate this need going forward
  • Lower costs by managing code reviews and remediation internally
  • Develop the organization’s competitive advantage for security-conscious customers
  • Nurture and retain highly skilled, security conscious employees
  • Demonstrate commitment to security through training and change management

Prerequisites

Who Should Take This Class?

  • Software developers (juniors to seniors)
  • Tech leads and Software Architects

This course is suitable for software development teams and Architects who want to build and maintain secure software. The syllabus considers different application development strategies, from preserving legacy applications to threat modelling new/existing applications.

Delegate Requirements

Delegates need to have a basic understanding of how web applications work with an added advantage for those who currently develop web applications. This training is a programming language agnostic.

What you will need:

A Laptop with minimum 4 GB RAM and 1 GB of extra space is also required.

It is recommended that you complete one of the following courses before taking this course:

The Art of Hacking

AppSec for Developers

Course Information

You can download a copy of the course information below.

In addition you will also be provided with a student pack, handouts and cheat-sheets if appropriate.

Download the course information

Your Training Roadmap

Offensive Classes

Hacking training for all levels: new to advanced. Ideal for those preparing for certifications such as CREST CCT (ICE), CREST CCT (ACE), CHECK (CTL), TIGER SST as well as infrastructure / web application penetration testers wishing to add to their existing skill set.

Defensive Classes

Giving you the skills needed to get ahead and secure your business by design. We specialise in application security (both secure coding and building security testing into your software development lifecycle) and cloud security. Build security capability into your teams enabling you to move fast and stay secure.

Testimonials

These trainings from NotSoSecure are world class (Black Hat Level) and truly worth it."

Delegate, Black Hat AppSecOps Course

The trainer was very knowledgeable and paced the training about right - strong practical focus complemented the 'theory'. All in all very pleased with the training - and much better experience and value than any previous courses I have attended where the trainer was a generalist delivering to a 'script'."

Delegate, Private QA AppSec class

Good course, knowledgeable trainer. Excellent Demos!"

Delegate, Private QA AppSec class

The tools presented are excellent. It was good that there had obviously been a lot of work done on finding good tools for each piece of the course."

Delegate, AppSecOps Course

The content was really interesting and I like the real-world examples of what was being explained."

Delegate, AppSecOps Course

Thank you @notsosecure and @nullcon for the extensive training on DevSecops. Really engaging and a great learning session. Worth mentioning the material and the hands on-lab. Kudos to the team and their hard work for a smooth experience."

Delegate, Nullcon 2021

Check our "Application Security for Developers" webinar below to learn how to find and fix those weaknesses. Gain hands-on secure-coding techniques, practical tools, and DevSecOps workflows to make secure development second nature.

You can also watch our recent 2024 webinar “Find & Fix- How common code flaws let hackers in, and how you keep them out | Live Demo” to learn how to identify and fix common code-level vulnerabilities, including a live demo on SSRF attacks.