Mobile App Hacking Training
Date: 01 Oct 2019

Learn how to identify security flaws in iOS & Android apps to reduce costs by implementing security features early on.

The Mobile Security training course consists of two days. The first day is focused on Android and the second day on iOS. We start from a theoretical perspective with practical exercises in each afternoon, so you go home with a toolbox and practical experience.

Secure Programming Training
Date: 03 Oct 2019

With the amount of (attempted) security breaches and high-paced agile sprint cycles, securing your software from day 1 is a major cost-saver. Know where common security flaws lie and how they can be prevented.

With the amount of (attempted) security breaches and high-paced agile sprint cycles, securing your software from day 1 is a major cost-saver. When developers know where common security flaws lie and how they can be prevented, the risk of security breaches and costs will be reduced by implementing security features early on. This course is given by Secura security experts, focused on code review and application security.

Hacker Mindset Workshop
Date: 09 Oct 2019

Join this interactive workshop to better understand the approach of an attacker and gain knowledge about technical vulnerabilities.

During the Hacker Mindset workshop, a guided, hands-on, technical session will be held where participants will be attacking a vulnerable application. Part frustration, part exhilaration, as these are both key elements in what drives hackers and will help you understand why hackers do what they do. We start with a vulnerable web application, and end with total control over the web server by compounding small design mistakes, vulnerabilities, and misconfigurations.

Threat Modeling Training
Date: 18 Oct 2019

It is important to ensure focus and efficiency by doing the most important security assessments on the right targets. However, what are these and how can you determine where the focus should be? Within this course our experts teach you how to do threat modeling according to the STRIDE methodology to support answering these questions. Learn how to: - Find problems when there's time to fix them - Identify the issues with the most risk first - Address Security Development Lifecycle (SDL) requirements - Deliver more secure products - Save costs

The eight-hour training course is divided in multiple sections.

Section 1: Introduction to threat modeling
The training course starts off with general introductions about threat modeling. What exactly is threat modeling, what are the benefits of it, and what are the basics of threat modeling.

Section 2: Creating a DFD-Diagram
We will create a DFD (Data Flow Diagrams) of a real-life case as an example. During the creation of the diagram we will jointly think about which aspects are important to how to create these diagrams in practice.

Section 3: Identifying threats
After creating a diagram, the threats can be identified. In this part we will introduce methods that can be used for this purpose, such as STRIDE, attack trees and attack libraries. Next, we will discuss STRIDE in more detail.

Section 4: Mitigating threats
After identifying the applicable threats, the following step is to mitigate these in a structural way and to validate whether these threats have been successfully mitigated.

Section 5: Implementing threat modeling in the Security Development Lifecycle
How can you implement threat modeling in the existing development processes and when should you perform threat modeling?

Lastly you get tips and tricks to lead efficient threat modeling sessions to get the maximum result in a short period of time.

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information