This is our Specialist course for Appsec Developers and is part of the AppSecOps course.
In this 2-Day Intermediate hands-on course delegates will gain an understanding of application security vulnerabilities including the industry standard OWASP Top 10 list and learn strategies to defend against them.
Pen testing (security testing) as an activity tends to capture security vulnerabilities at the end of the SDLC and then it is often too late to influence fundamental changes in the way the code is written.
Web application security tends to be addressed only when vulnerabilities are found on applications running in production. Addressing these vulnerabilities at that stage becomes an expensive affair. These vulnerabilities arise primarily because developers are not sensitized against their impact and more importantly their fixing/patching.
The aim of this class is two-fold:
- Sensitize developers about application security vulnerabilities and their impact through live exploitation of a vulnerable application.
- Guide the developers to identify the root cause of the vulnerability in code, patch it, re-deploy the application, and finally verify the fix. All of this completely from the browser.
Throughout this class, developers will be able to get on the same page with security professionals, understand their language, learn how to fix or mitigate vulnerabilities learnt during the class and get acquainted with some real-world breaches, for example, “The Equifax” breach in September 2017. Various bug bounty case studies from popular websites like Facebook, Google, Shopify, Paypal, Twitter etc will be discussed explaining the financial repercussions of application security vulnerabilities like SSRF, XXE, SQL Injection, Authentication issues etc.
The application that the audience will interact with is a Shopping cart application built on a microservices architecture and deployed using docker. Microservices are built using different languages like Java, .NET Core, PHP, Python, NodeJS, HTML and JavaScript each containing different vulnerabilities that needs patching.However, the approach is kept generic and developers from other language backgrounds can easily grasp and implement the knowledge learned within their own environments.
Each Delegate will be provided a separate lab infrastructure that is accessible completely from the browser.Delegates will participate in a CTF challenge where they will have the chance to identify vulnerabilities in code snippets derived from real-world applications.
Fast track available
2 day course
Available by Partners
Live, online available
Hack-Lab is available
Intermediate
AppSec for Developers - Webinar
Global credit reporting agency Equifax, Australian telecommunications giant Optus, and even the Shanghai Police force have recently fallen victim to cyberattacks that exploited weaknesses in software – vulnerabilities that could have been identified and remediated through secure application development practices. How you develop your applications is as essential to their security as any other defensive control. This video introduces application security for developers. Learn direct from our experienced, practicing pentesters well-versed in how to hack applications (and how to find and fix those weaknesses).
In the video:
- Practical application security skills and knowledge to use everyday
- Techniques and tools to help make secure coding second nature
- The ins and outs of DevSecOps to help you totally transform your dev practices from the ground up
Whether you’re a software developer, a dev team lead, or just looking to expand your security skills, this video will help you explain how to remain relevant in an increasingly security conscious industry.
To find out more about our Application Security for Developers course and register, click here.
Course Overview
The future of secure software is in your hands. Join this extremely informative 2-day course to bring your application security skills up to the industry standard and widen your career prospects. Get significant hands-on experience with our popular virtual labs and learn from industry experts, practicing penetration testers with a legacy of training at Black Hat. You’ll learn how to find and fix vulnerabilities in code, enhance the security culture within your dev team, apply DevSecOps thinking day to day, and more...
Interested?
1. Our courses are available directly from us; through our training partners or at worldwide technical conferences.
2. You can find course dates and prices on the Courses and Webinars page.
3. Take a look below at a few of the upcoming courses for this specific training.
4. For more information including private course requests, complete the short form below.
Courses and webinars
Booking enquiries
Select the course from the Courses and Webinars Page.
Click here for course dates and prices
For private course delivery enquiries or other information, please use the form alongside.
The course is also available from our partners listed below.
If booked through Check Point, Cyber-Security Leraning Credits are accepted for this course.
For security and IT decision makers
What’s the real impact of training your team through NotSoSecure?
Make your organisation a less attractive target to attackers by building a team that can write code resistant to complex, modern attacks, without losing business functionality and development speed. Trained delegates can:
- Write secure application code resilient to a variety of web-based attacks in the OWASP top 10.
- Understand how attackers identify vulnerabilities in code, and the impact of this, so they can adopt more secure ways of working.
- Identify and mitigate security vulnerabilities earlier on in the development lifecycle.
- Use a vocabulary of risk and exploitation to work more effectively with security practitioners.
- Understand the business impact of application security and articulate this to key stakeholders.
- Take on greater responsibility in the team and become an advocate of security in the wider business.
Course Details
What you will learn
This course uses a Defense by Offense methodology based on real world offensive research (not theory). That means everything we teach has been tried and tested on live environments and in our labs, so you can put it into practice as soon as the training is over. By the end of the course, you’ll know:
- Everything you need to about application security vulnerabilities, including why they occur, how they impact your applications, and what risk they pose to the wider organization
- The principles of application security and Secure by Design thinking
- How to develop secure applications, from writing secure code to building and governing secure processes
- How to find and fix vulnerabilities in existing application code
- How to build and maintain a culture of security across the team using secure practices and tools
What you will be doing
You’ll be learning hands on:
- Hacking insecure code to see what vulnerabilities look like in your applications
- Fixing these vulnerabilities so you can secure your own application.
- Discussing the functionality requirements of secure application development so you can design security into everything
- Applying real world case studies to your development thinking
- Competing in a timed, fast-paced Capture the Flag (CTF) game to test your new skills
You will receive:
- Certificate of completion
- 24 hours’ lab access post-course completion (with the opportunity to extend)
- 8 Continuing Professional Education (CPE) credits awarded per day of training fulfilled
- Learning pack, including question & answer sheets, setup documents, and command cheat sheets
What you can take away from the course:
- Practical application security skills and knowledge to use daily
- Techniques and tools to help you code securely by second nature
- DevSecOps awareness to help you transform your dev practices from the ground up
Why it is relevant
Have you ever developed an application without testing the code for vulnerabilities or shipped software with known security flaws? Software has become a frontline target for cybercriminals who want to disable, disrupt, and destroy systems and harm individuals. And some of the most newsworthy hacks in recent years – including credit reporting agency Equifax, telecommunications giants T-Mobile and Optus, and even the Shanghai Police – have been the result of vulnerabilities in application code. From customer data being stolen, to entire organizations going offline, secure code matters.
There are other reasons to develop your ability too. As security becomes more embedded in the way we work, employers are increasingly looking for development specialists who can demonstrate technical application security skills all the way up to CTO level. Secure coding proficiency directly correlates with your growth and career progression and can lead you into new areas.
This course is packed full of exercises and topics relevant to the current threat landscape and the latest industry-standard development systems and processes. Our syllabuses are also revised regularly to reflect the latest in-the-wild hacks and whatever proof of concepts we’ve been developing through our own research. Because they remain so up to date with the threat landscape and security industry standard, many delegates return every 1-2 years to update their skills and get a refresh.
Details of the course content:
APPLICATION SECURITY BASICS
- Why do we need Application Security?
- Understanding OWASP TOP 10
UNDERSTANDING THE HTTP PROTOCOL
- Understanding HTTP/HTTPS protocol
- Understanding Requests and Responses – Attack Surface
- Configure Burpsuite to intercept HTTP/HTTPS traffic
SECURITY MISCONFIGURATIONS
- Common misconfigurations in Web Applications
- Sensitive Information exposure and how to avoid it
- Using Softwares with known vulnerabilities
INSUFFICIENT LOGGING AND MONITORING
- Types of Logging
- Introduction to F-ELK
AUTHENTICATION FLAWS
- Understanding Anti-Automation Techniques
- NoSQL Security
AUTHORIZATION BYPASS TECHNIQUES
- Securing JWT and OAuth
- Local file Inclusion
- Mass Assignment Vulnerability
CROSS-SITE SCRIPTING (XSS)
- Types of XSS
- Mitigating XSS
CROSS-SITE REQUEST FORGERY SCRIPTING
- Understanding CSRF
- Mitigating CSRF
SERVER-SIDE REQUEST FORGERY (SSRF)
- Understanding SSRF
- Mitigating SSRF
SQL INJECTION
- Error and Blind SQL Injections
- Mitigating SQL Injection
- ORM Framework: HQL Injection
XAML EXTERNAL ENTITY (XXE) ATTACKS
- Default XML Processors == XXE
- Mitigating XXE
UNRESTRICTED FILE UPLOADS
- Common Pitfalls around file upload
- Mitigating File upload vulnerability
DESERIALIZATION VULNERABILITIES
- What is Serialization?
- Identifying Deserialization functions and deserialized data
- Mitigation strategies for deserialization
CLIENT-SIDE SECURITY CONCERNS
- Understanding Same Origin Policy
- Client-Side Security headers and their server configurations
SOURCE CODE REVIEW
- How to validate source code security
- Walkthrough: How threat actors chain vulnerabilities to achieve greater impact
- Capture the Flag: a timed competition challenging you to spot flaws in different samples of source code.
DEVSECOPS
- DevSecOps: what is it, how do you build it, and what tools can you use?
Course highlights
What delegates love:
- Offensive angle: you’ll learn from practicing penetration testers and red teamers with up to date, working knowledge of the latest and most common software hacks.
- Multiple mitigations:for every vulnerability covered, you’ll explore 3 to 4 remediations, helping you develop a versatile, relevant approach.
- Focus on awareness and process as well as code: you’ll learn the principles behind the practical approach.
- Browser based: the course is fast to set up, requiring a single installation of Burp Suite
- Individual access: you’ll have your own infrastructure to play with, enabling you to try out secure coding and mitigation techniques independently, at your own pace.
- Real-world learning: in an industry where most of the leading cybersecurity training courses are based on theory, our scenario-led, research-based approach ensures you learn how real threat actors think and act.
Outcomes for budget holders
This course is designed to help organizations upskill their development team in response to evolving cyber risk, helping senior decision makers:
- Manage the likelihood and impact of security incidents originating from insecure code and development practices
- Lower the cost of retrofitting security into existing applications and workflows and totally eradicate this need going forward
- Lower costs by managing code reviews and remediation internally
- Develop the organization’s competitive advantage for security-conscious customers
- Nurture and retain highly skilled, security conscious employees
- Demonstrate commitment to security through training and change management
Prerequisites
Who Should Take This Class?
- Software developers (beginner to advanced)
- Development team leads
This course is suitable for software developers and development teams who want to build and maintain secure software. The syllabus considers different application development strategies, from preserving legacy applications to developing new products.
Delegate Requirements
Delegates need to have a basic understanding of how web applications work with an added advantage for those who currently develop web applications. This training is a programming language agnostic.
What you will need:
A Laptop with minimum 4 GB RAM and 1 GB of extra space is also required.
It is recommended that you complete one of the following courses before taking this course:
The Art of Hacking
Course Information
You can download a copy of the course information below.
In addition you will also be provided with a student pack, handouts and cheat-sheets if appropriate.
Your Training Roadmap
Offensive Classes
Hacking training for all levels: new to advanced. Ideal for those preparing for certifications such as CREST CCT (ICE), CREST CCT (ACE), CHECK (CTL), TIGER SST as well as infrastructure / web application penetration testers wishing to add to their existing skill set.
Defensive Classes
Giving you the skills needed to get ahead and secure your business by design. We specialise in application security (both secure coding and building security testing into your software development lifecycle) and cloud security. Build security capability into your teams enabling you to move fast and stay secure.
Testimonials
These trainings from NotSoSecure are world class (Black Hat Level) and truly worth it."
Delegate, Black Hat AppSecOps Course
The trainer was very knowledgeable and paced the training about right - strong practical focus complemented the 'theory'. All in all very pleased with the training - and much better experience and value than any previous courses I have attended where the trainer was a generalist delivering to a 'script'."
Delegate, Private QA AppSec class
Good course, knowledgeable trainer. Excellent Demos!"
Delegate, Private QA AppSec class
The tools presented are excellent. It was good that there had obviously been a lot of work done on finding good tools for each piece of the course."
Delegate, AppSecOps Course
The content was really interesting and I like the real-world examples of what was being explained."
Delegate, AppSecOps Course
Thank you @notsosecure and @nullcon for the extensive training on DevSecops. Really engaging and a great learning session. Worth mentioning the material and the hands on-lab. Kudos to the team and their hard work for a smooth experience."
Delegate, Nullcon 2021