Embark on a comprehensive journey into web application security with our two-day seminar-style course, “Securing Web Applications / 2021 OWASP Top Ten and Beyond”. Designed for web developers and technical stakeholders, this course equips you with the foundational concepts of defensive and secure coding. You’ll learn to move beyond the “penetrate and patch” approach, integrating security into your applications from the get-go, leading to robust, resilient software.Throughout the engaging course, you’ll delve into the best practices for defensively coding web applications, addressing the 2021 OWASP Top Ten (latest edition) and several other vital vulnerabilities. Learn from the mistakes of the past as we dissect real-world examples of poorly designed web applications, providing you with stark illustrations of the potential fallout when security best practices are not adhered to. Our security expert will guide you on the process of integrating security measures into your development lifecycle, ensuring you build secure applications from the ground up.The course goes beyond theory, offering practical skills directly applicable to your work: ethical hacking, bug hunting, detection, and mitigation of threats to authentication and authorization functionalities. You’ll understand the mechanics and threats of Cross-Site Scripting (XSS) and Injection attacks and comprehend the risks and mitigation strategies associated with XML processing, software uploads, and deserialization.
Date | Time | Price | Option |
---|---|---|---|
02/03/2025 | 09:00 AM - 05:00 PM CT | $1,695.00 | |
04/14/2025 | 09:00 AM - 05:00 PM CT | $1,695.00 | |
06/16/2025 | 09:00 AM - 05:00 PM CT | $1,695.00 | |
08/18/2025 | 09:00 AM - 05:00 PM CT | $1,695.00 | |
10/20/2025 | 09:00 AM - 05:00 PM CT | $1,695.00 | |
12/01/2025 | 09:00 AM - 05:00 PM CT | $1,695.00 |
Course Topics / Agenda
Please note that this list of topics is based on our standard course offering, evolved from typical industry uses and trends. We’ll work with you to tune this course and level of coverage to target the skills you need most. Topics, agenda and labs are subject to change, and may adjust during live delivery based on audience skill level, interests and participation.
Session: Bug Hunting Foundation
Lesson: Why Hunt Bugs?
Lesson: Safe and Appropriate Bug Hunting/Hacking
Session: Moving Forward From Hunting Bugs
Lesson: Removing Bugs
Session: Foundation for Securing Web Applications
Lesson: Principles of Information Security
Session: Bug Stomping 101
Lesson: Unvalidated Data
Lesson: A01: Broken Access Control
Lesson: A02: Cryptographic Failures
Lesson: A03: Injection
Lesson: A04: Insecure Design
Lesson: A05: Security Misconfiguration
Session: Bug Stomping 102
Lesson: A06: Vulnerable and Outdated Components
Lesson: A07: Identification and Authentication Failures
Lesson: A08: Software and Data Integrity Failures
Lesson: A09: Security Logging and Monitoring Failures
Lesson: A10: Server-Side Request Forgery (SSRF)
Session: Moving Forward
Lesson: Applications: What Next?
Optional / Bonus Content
Bonus Chapter: Leveraging AI in Web Application Security Development
Learning Objectives
This course will walk you through how to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. You will explore most common security vulnerabilities faced by web applications today, examining each vulnerability from a coding perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing and implementing effective defenses.
This course combines engaging instructor-led presentations and useful demonstrations with valuable hands-on labs and engaging group activities. Throughout the course you’ll:
If your team requires different topics, additional skills or a custom approach, our team will collaborate with you to adjust the course to focus on your specific learning objectives and goals..;/
This is an overview-level course ideally suited for web developers, software engineers, system administrators, and other technical stakeholders who are involved in the design, development, or maintenance of web applications. Security professionals looking to deepen their understanding of web application vulnerabilities and defense mechanisms would also greatly benefit. Moreover, project managers and leaders who wish to ensure their teams are following best practices for secure application development will find this course valuable in shaping their strategic direction.
This is not a hands-on course, however its helpful if you have: