Advanced Application Security Training

The prolific growth of data entrusted to web applications and transferred or preserved on mobile devices and apps has made understanding secure coding practices and principles a critical mission of developers, architects, testers and managers. The days of relying on firewalls to protect an organization are past.

Proper protection and defenses of web and mobile application reduces costs and increases the reputation of your organization.

Partnering with Infrared Security, ELC has developed training designed to teach how to robustly defend your organization’s web and mobile applications. Our training emphasizes secure coding practices and principles from both a “technical” and “less-technical” perspective.  Defenses for a multitude of security issues are covered in depth across multiple languages and platforms.

Our courses are intended for anyone tasked with implementing, protecting or managing web applications enabling proper protection of your organization’s assets.

  • Technical modules feature code-level guidance across many programming languages designed to teach users to identify, diagnose, remediate and eliminate web and mobile application security risks.
  • Less technical modules are designed to provide managers and general users the principles and knowledge needed to ensure web and mobile applications security.
  • Courses cover a wide range of topics with role-specific learning paths.
  • SCORM compliant library can be hosted in your internal LMS or accessed within our 24/7 cloud-based hosting environment.

Topics of the Development Security Training Course

Injection, Broken Authentication and Session Management, Cross-Site Scripting (XSS), Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Function Level Access Control, Cross-Site Request Forgery (CSRF), Using Components with Known Vulnerabilities, and Unvalidated Redirects and Forwards.

Advanced Application Security Training Course Options

OWASP Top Ten for Developers

Duration: 5 hour(s) of content, approximately 8 hour(s) to complete
Audience: Software Engineers, Software Architects and Software Testers

OWASP Top Ten for Managers

Duration: 1 hour of content, approximately 1.5 hour(s) to complete
Audience: Software Managers

Defensive Enterprise Remediation

Duration: 1 hour of content, approximately 1.5 hour(s) to complete
Audience: Software Engineers, Software Architects and Software Testers

Thread Modeling

Duration: 1 hour of content, approximately 1.5 hour(s) to complete
Audience: Software Architects and Security Engineers

Building Secure ASP.NET Applications

Duration: 1 hour of content, approximately 1.5 hour(s) to complete
Audience: Software Engineers and Software Architects

Building Secure Mobile Applications

Duration: 1 hour of content, approximately 1.5 hour(s) to complete
Audience: Software Engineers and Software Architects

Building Secure JAVA EE Applications

Duration: 1 hour of content, approximately 1.5 hour(s) to complete
Audience: Software Engineers and Software Architects

Building Secure JAVASCRIPT Applications

Duration: 1 hour of content, approximately 1.5 hour(s) to complete
Audience: Software Engineers and Software Architects

Get Your Free Demo Today!

  • No obligation to purchase with demo
  • Competitive quotes
  • Employee phishing test available
  • We customize your course at no extra charge

Development Security Training is smart business practice. Investing in online application security training courses is a smart investment that protects your development business against damaging security breaches and client litigation.

Are you ready to train your Team?

Learn more about our Advanced Security Training course offerings or sign up for a course demo today.

Learn the OWASP Top 10 Security Vulnerabilities

This series of eLearning modules focuses on the most common security vulnerabilities and attack vectors facing application developers today as defined by the OWASP Top Ten. Participants of these modules will explore the OWASP Top Ten through detailed analysis of real-world examples, rich visualizations of attacks, as well as detailed discussions of mitigation strategies with supporting code examples. After completing these modules, participants will be able to more readily identify, mitigate, and prevent common security vulnerabilities within their own applications.