Toutes nos formations sont désormais disponibles en "Live Virtual classes". Contactez-nous pour plus d’informations : formation@oxiane.luToutes nos formations sont désormais disponibles en "Live Virtual classes". Contactez-nous pour plus d’informations : formation@oxiane.lu

Secure Development (accès Code Bashing pendant 1 an en option)

Accueil » Formations » Front / Mobile » Secure Development (accès Code Bashing pendant 1 an en option)

Formation mise à jour régulièrement !

Accès code bashing pendant 1 an compris après la formation !

1980 € HT 2 jours DEV-SECURE

Programme

Introduction to the Web Application Vulnerability Assessment & Introduction to the Mobile Application Vulnerability Assessment

  • Training identity card:
    • Type: Labs
    • Audience: Everyone that have already developed web applications
    • Technology: Web technologies

What the students will learn:

  • During this training, the students will discover:
    • What is a Web Application Vulnerability Assessment ?
    • The different steps of this kind of assessment
    • The methodology used to rate the security issues
    • The open referential that can be used to conduct an assessment

Introduction to the Mobile Application Vulnerability Assessment

Training identity card:

  • Type: Labs
  • Audience: Everyone that have already developed mobile applications
  • Technology: Mobile technologies

What the students will learn:

  • During this training, the students will discover:
    • What is a Mobile Application Vulnerability Assessment ?
    • The different steps of this kind of assessment
    • The methodology used to rate the security issues
    • The open referential that can be used to conduct an assessment

Introduction to Secure Coding

  • Training identity card:
    • Type: Theoretical
    • Audience: Everyone
    • Technology: Independent

What the students will learn:

  • During this training, the students will discover:
    • What is the Application Security?
    • Why the security of an application is important for is life in the company information system ?
    • Principles of Secure Coding
    • Common security error meet during development and how to prevent them

Practical demonstrations of common vulnerabilities

  • Training identity card:
    • Type: Demonstration
    • Audience: All developers
    • Technology: Independent

What the students will learn:

  • During this training, the students will discover:
    • Different kind of vulnerabilities that are commonly present in applications
    • How to detect them
    • How to validate them
    • How to fix them