Skip to content

Secure web course

Enhance your skills and comprehensively understand safeguarding your web development projects. You’ll learn how to use developer tools to detect and prevent issues and defend against malicious attacks.

hatékony IT csapat recesszió idején 3

Who is the Secure web course​ course perfect for

Web developers who want to gain a deep understanding of how development can be used to achieve security.
Course details

Secure web course

What you'll learn

During the course we will cover:

a., What is security, and who is OWASP?

b., Why is developing the best way to achieve security?

c., Threat modeling: the purpose of threat modeling, components of threat models, and practical threat modeling

a., Developer tools for preventing the following security issues Logging and monitoring problems, use of components with known vulnerabilities, Serialization and deserialization issues, not just web scripting problems (XSS),

b., Incorrect security configurations, poor access control,

c., XML processing issues (XXE), sensitive data disclosure,

d., faulty authentication and session management, injection attacks.

a.,Problems arising from incorrect API usage (SecureRandom), incomplete knowledge of standards (number representation, floating point), exploitation of character encoding

b., Manipulation of server-side requests (SSRF), race conditions in applications

c., (race conditions), buffer overflow attacks

d., Cryptography basics: encryption, decryption, hashing

a., Why is the OWASP Top 10 not enough?

b.,Structure of attacks, how a hacker thinks

c., Developer tools for preventing the following security issues, interesting topics (based on time and audience preference):

  • Problems with referenced pages (reverse tabnabbing);
  • Manipulation of server-side requests (SSRF);
  • HTTP packet smuggling (HTTP request smuggling);
  • Race conditions in applications (race conditions);
  • Unvalidated redirects;
  • Poor use of cryptographic algorithms;
  • DoS (+ReDoS)
  • ClickJacking;
  • cache poisoning;
  • buffer overflow attacks.

Apply, learn more, or request a tailored quote!​

Eniko Vasenszki

B2B Training Manager

[email protected] +36706582121
Lea Kalocsai

Head of sales







    Stay sharp in the tech world!

    Subscribe to our newsletter for monthly doses of tech trends, insider updates and a competitive edge.