Corporate / Group Training

Security Testing Python Web Applications

Cydrill Software Security, Online (+1 locations)
Length
3 days
Next course start
Available in all time zones (+2 start dates)
Delivery
On-site, Self-paced Online
Length
3 days
Next course start
Available in all time zones (+2 start dates)
Delivery
On-site, Self-paced Online
This provider usually responds within 48 hours 👍

Course description

Security Testing Python Web Applications

Your Web application written in Python is tested functionally, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -232? Because that’s what the bad guys will do – and the list is far from complete.

Testing for security needs a remarkable software security expertise and a healthy level of paranoia, and this is what this course provides: a strong emotional engagement by lots of hands on labs and stories from real life.

The curriculum goes through the common Web application security issues following the OWASP Top Ten but goes far beyond it both in coverage and the details.A special focus is given to finding all discussed issues during testing, and an overview is provided on security testing methodology, techniques and tools.

So that you are prepared for the forces of the dark side.

So that nothing unexpected happens.

Nothing.

Do you work at this company and want to update this page?

Is there out-of-date information about your company or courses published here? Fill out this form to get in touch with us.

Upcoming start dates

Choose between 2 start dates

Available in all time zones

  • On-site
  • Worldwide

Instructor-led online training aligned to the availability of your teams

  • Self-paced Online
  • Online

Who should attend?

Audience

Developers and testers working on Web applications

Preparedness

General Web development

Objective list

  • Getting familiar with essential cyber security concepts
  • Understanding Web application security issues
  • Detailed analysis of the OWASP Top Ten elements
  • Putting Web application security in the context of Python
  • Going beyond the low hanging fruits
  • Understanding security testing methodology and approaches
  • Getting familiar with common security testing techniques and tools
  • Handling security challenges in your Python code
  • Identify vulnerabilities and their consequences
  • Learn the security best practices in Python

Training content

Table of contents

Day 1

> Cyber security basics

> The OWASP Top Ten

   A1 - Injection

   A2 - Broken Authentication

Day 2

> Security testing methodology

   Identifying and rating assets

> The OWASP Top Ten

   A3 - Sensitive Data Exposure

   A4 - XML External Entities (XXE)

   A5 - Broken Access Control

   A6 - Security Misconfiguration

   A7 - Cross-site Scripting (XSS)

Day 3

> The OWASP Top Ten

   A8 - Insecure Deserialization

   A9 - Using Components with Known Vulnerabilities

   A10 - Insufficient Logging & Monitoring

   Web application security beyond the Top Ten

> Security testing

   Security testing techniques and tools

> Common software security weaknesses

   Input validation

> XML security

   XML injection

   XML signature

> JSON security

> Wrap up

   And now what?

See full Table of Contents in the downloadable brochure.

Contact this provider

Contact course provider

Before we redirect you to this supplier's website, do you mind filling out this form so that we can stay in touch? You can unsubscribe at any time.
If you want us to recommend other suitable courses, please fill out all fields below and check the box beside "Please recommend similar options"
Country *

reCAPTCHA logo This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Cydrill Software Security
SZTAKI Bldg
Lagymanyosi str. 11
1111 Budapest

Cydrill Software Security

The team of Cydrill Software Security will help you embed secure coding skills in your organization through a blended learning journey. Gamified lab exercises assist in the acquisition of best practices so that the coding mistakes that lead to vulnerabilities...

Read more and show all training delivered by this supplier

Ads