Advanced Application Security Training for Managers, Developers and Architects

Build a Solid and Scalable Educational Program for Your Entire Development Team

Education is the cornerstone of any modern development security training program. Developers, managers, architects and testers must be fully aware of a large variety of attacks and, more importantly, how to defend your organization’s web and mobile applications. With that in mind, ELC has partnered with Infrared Security to provide an Advanced Application Security Training course for your managers, developers and architects.

The course features security learning tracks for “technical” and “less-technical” participants. Technical modules feature code-level guidance across many programming languages. Participants of our offerings will be able to more readily identify, mitigate, and prevent common security vulnerabilities within their applications and their software development life-cycles (SDLC).

  • Participants gain a deep understanding of major risks inherent to web and mobile applications
  • Defenses for each security issue covered in depth across multiple languages and platforms
  • Courses cover a wide range of topics with role-specific learning paths
  • SCORM compliant library can be hosted in your internal LMS or accessed within our 24/7 cloud-based hosting environment

Topics of the Development Security Training Course

Injection, Broken Authentication and Session Management, Cross-Site Scripting (XSS), Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Function Level Access Control, Cross-Site Request Forgery (CSRF), Using Components with Known Vulnerabilities, and Unvalidated Redirects and Forwards.

Advanced Application Security Training Course Options

OWASP Top Ten for Developers

Duration: 5 hour(s) of content, approximately 8 hour(s) to complete
Audience: Software Engineers, Software Architects and Software Testers

OWASP Top Ten for Managers

Duration: 1 hour of content, approximately 1.5 hour(s) to complete
Audience: Software Managers

Defensive Enterprise Remediation

Duration: 1 hour of content, approximately 1.5 hour(s) to complete
Audience: Software Engineers, Software Architects and Software Testers

Thread Modeling

Duration: 1 hour of content, approximately 1.5 hour(s) to complete
Audience: Software Architects and Security Engineers

Building Secure ASP.NET Applications

Duration: 1 hour of content, approximately 1.5 hour(s) to complete
Audience: Software Engineers and Software Architects

Building Secure Mobile Applications

Duration: 1 hour of content, approximately 1.5 hour(s) to complete
Audience: Software Engineers and Software Architects

Building Secure JAVA EE Applications

Duration: 1 hour of content, approximately 1.5 hour(s) to complete
Audience: Software Engineers and Software Architects

Building Secure JAVASCRIPT Applications

Duration: 1 hour of content, approximately 1.5 hour(s) to complete
Audience: Software Engineers and Software Architects

Get Your Free Demo Today!

  • No obligation to purchase with demo
  • Competitive quotes
  • Employee phishing test available
  • We customize your course at no extra charge

Development Security Training is smart business practice. Investing in online application security training courses is a smart investment that protects your development business against damaging security breaches and client litigation.

Are you ready to train your team?

Learn more about our Advanced Security Training course offerings or sign up for a course demo today.

Learn the OWASP Top 10 Security Vulnerabilities

This series of eLearning modules focuses on the most common security vulnerabilities and attack vectors facing application developers today as defined by the OWASP Top Ten. Participants of these modules will explore the OWASP Top Ten through detailed analysis of real-world examples, rich visualizations of attacks, as well as detailed discussions of mitigation strategies with supporting code examples. After completing these modules, participants will be able to more readily identify, mitigate, and prevent common security vulnerabilities within their own applications.