Application Security: Fundamentals
Understand the basics of secure software development. In this one-day, hands-on training, you’ll learn how to apply the OWASP Top 10 and API Security Top 10 to identify vulnerabilities, minimize risks, and make your software structurally more secure.
The foundation of secure software development
Cyber threats like data breaches, ransomware, and phishing are everyday realities. They often arise not from bad intentions, but from a lack of security knowledge. In this training, you’ll learn how attacks happen, how hackers think, and – most importantly – how to use that knowledge to better protect your applications.
We work with the internationally recognized OWASP standards, the most widely used framework for secure software development. You’ll learn to recognize, prevent, and mitigate the ten most common vulnerabilities, with special focus on API security. Theory, demos, and hands-on exercises alternate, so you not only know what to do but also why.
This training is designed by Betabit specialists who work daily on business-critical software in Azure. Their real-world experience ensures that every example is realistic and directly applicable in your own development environment.
🕐 Duration: 1 day (hands-on training)
👥 Audience: Developers, testers, and software architects with basic knowledge of APIs and request/response principles
What you’ll learn
After a short introduction, you’ll get to work with demos, exercises, and hands-on challenges:
- Hacker mindset & hacker kill chain
- Understand how hackers think and operate
- Learn to recognize attack patterns
- Theoretical explanations and demonstrations
- OWASP: Open Worldwide Application Security Project
- Background and relevance of OWASP
- Applying the OWASP and API Security Top 10
- The most common vulnerabilities
- Broken Object Level Authorization
- Broken User Authentication
- Excessive Data Exposure
- Cross-site scripting (XSS)
- Cross-site and Server-side Request Forgery (CSRF/SSRF)
- Lack of Resources and Rate Limiting
- Broken Function Level Authorization
- Mass Assignment
- Security Misconfiguration
- Injection
- Improper Assets Management
- Security Logging and Monitoring
- Hands-on exploitation and mitigation
- Discover, exploit, and fix vulnerabilities yourself
- Practical exercises with post exploitation, reverse shells, and hacking tools
Security as an integral part
After this training, you’ll spot vulnerabilities faster, understand how attackers think, and know which measures are truly effective. You’ll gain the knowledge and skills to embed security structurally into your development — not as an afterthought, but as a core element of true craftsmanship.
Interested? We will contact you shortly.
Interested? Talk to Esther about it!
More training courses
-
Application Security: Deep Dive
Embed security structurally into your software development. In this one-day hands-on training, you’ll dive deeper into security testing, code analysis, and the risks of AI tools, enabling a security-first approach throughout the entire software development lifecycle. -
Application Security: Threat Modeling
Prevent vulnerabilities before they occur. In this training, you’ll learn how to systematically identify, analyze, and address security risks and potential threats early on – as an integral part of your development process.