Secure Developer Training

[fusion_builder_container admin_label=”Main Header” hundred_percent=”no” hundred_percent_height=”no” hundred_percent_height_scroll=”no” hundred_percent_height_center_content=”yes” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”https://www.nettitude.com/us/wp-content/uploads/sites/5/2017/11/Cyber-Security-Services.jpg” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_size=”” border_color=”” border_style=”solid” margin_top=”0″ margin_bottom=”0″ padding_top=”0px” padding_right=”” padding_bottom=”20px” padding_left=””][fusion_builder_row][fusion_builder_column type=”2_3″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no” element_content=””][fusion_text]

SECURE DEVELOPMENT TRAINING

The responsibility for securely developed applications lies, in part, with developers. However, it is often the case that developers are targeted and judged on areas that are not security related. It may be that the security of an application or system is an afterthought.

Nettitude deliver a two day secure development course aimed at empowering developers with techniques that result in secure code being delivered almost without thought. Securely developed code does not need to be an arduous affair. By integrating secure development practises into the core of what developers do, the overall security posture of their work will markedly improve with little impact to other measures of output. Nettitude specialise in making this a reality through secure development training.[/fusion_text][/fusion_builder_column][fusion_builder_column type=”1_3″ layout=”1_3″ spacing=”14%” center_content=”yes” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”#eeeeee” background_image=”” background_position=”left top” undefined=”” background_repeat=”no-repeat” border_size=”0″ border_color=”#eeeeee” border_style=”solid” border_position=”all” padding_top=”5%” padding_right=”5%” padding_bottom=”5%” padding_left=”5%” margin_top=”30″ margin_bottom=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_text]

Request a free quote

[/fusion_text][fusion_code]Jmx0O2h0bWwmZ3Q7CiZsdDtzdHlsZSB0eXBlPSZxdW90O3RleHQvY3NzJnF1b3Q7Jmd0Owpib2R5IC5ocy1idXR0b24ucHJpbWFyeSwKYm9keSBpbnB1dFt0eXBlPSZxdW90O3N1Ym1pdCZxdW90O10sCmJvZHkgaW5wdXRbdHlwZT0mcXVvdDtidXR0b24mcXVvdDtdCiAJeyAKICAJCWJhY2tncm91bmQ6LXdlYmtpdC1ncmFkaWVudChsaW5lYXIsIGxlZnQgdG9wLCBsZWZ0IGJvdHRvbSwgY29sb3Itc3RvcCgwLjA1LCAjNzViODQzICksIGNvbG9yLXN0b3AoMSwgIzc1Yjg0MyApKTsgICAgIAogIAkJYmFja2dyb3VuZDotbW96LWxpbmVhci1ncmFkaWVudCh0b3AsICM3NWI4NDMgNSUsICM3NWI4NDMgMTAwJSk7ICAgICAKICAJCWJhY2tncm91bmQ6LXdlYmtpdC1saW5lYXItZ3JhZGllbnQodG9wLCAjNzViODQzIDUlLCAjNzViODQzIDEwMCUpOyAgICAgCiAgCQliYWNrZ3JvdW5kOi1vLWxpbmVhci1ncmFkaWVudCh0b3AsICM3NWI4NDMgNSUsICM3NWI4NDMgMTAwJSk7ICAgICAKICAJCWJhY2tncm91bmQ6LW1zLWxpbmVhci1ncmFkaWVudCh0b3AsICM3NWI4NDMgNSUsICM3NWI4NDMgMTAwJSk7ICAgIAogIAkJYmFja2dyb3VuZDpsaW5lYXItZ3JhZGllbnQodG8gYm90dG9tLCAjNzViODQzIDUlLCAjNzViODQzIDEwMCUpOyAgICAgCiAgCQlmaWx0ZXI6cHJvZ2lkOkRYSW1hZ2VUcmFuc2Zvcm0uTWljcm9zb2Z0LmdyYWRpZW50KHN0YXJ0Q29sb3JzdHI9JiN4Mjc7Izc3YmUyMCAmI3gyNzssIGVuZENvbG9yc3RyPSYjeDI3OyM3N2JlMjAgJiN4Mjc7LEdyYWRpZW50VHlwZT0wKTsgICAgIAogIAkJYmFja2dyb3VuZC1jb2xvcjojMDAxMzI4OyAgICAgCiAgCQlib3JkZXI6MHB4IHNvbGlkICMwMDEzMjg7ICAgICAKICAJCWRpc3BsYXk6aW5saW5lLWJsb2NrOyAgICAgCiAgCQljdXJzb3I6cG9pbnRlcjsgICAgIAogIAkJY29sb3I6I2ZmZmZmZiA7ICAgICAKICAJCWZvbnQtZmFtaWx5OkFyaWFsOyAgICAgCiAgCQlmb250LXNpemU6MjFweDsgICAgIAogIAkJZm9udC13ZWlnaHQ6Ym9sZDsgICAgIAogIAkJbWFyZ2luOjA7IAogIAkJd2lkdGg6IDk5JTsgCiAgCQltYXgtd2lkdGggMzcwcHg7ICAgICAKICAJCXRleHQtZGVjb3JhdGlvbjpub25lOyAgCiAgCQlwYWRkaW5nOiAxMHB4IDIwcHg7CiAgICAgICAgbWFyZ2luLXRvcDozMHB4OwogIAl9CiAgCi5ocy1mb3JtIGlucHV0W3R5cGU9JnF1b3Q7dGV4dCZxdW90O10sCi5ocy1mb3JtIGlucHV0W3R5cGU9JnF1b3Q7cGFzc3dvcmQmcXVvdDtdLCAKLmhzLWZvcm0gaW5wdXRbdHlwZT0mcXVvdDtkYXRldGltZSZxdW90O10sIAouaHMtZm9ybSBpbnB1dFt0eXBlPSZxdW90O2RhdGV0aW1lLWxvY2FsJnF1b3Q7XSwgCi5ocy1mb3JtIGlucHV0W3R5cGU9JnF1b3Q7ZGF0ZSZxdW90O10sIAouaHMtZm9ybSBpbnB1dFt0eXBlPSZxdW90O21vbnRoJnF1b3Q7XSwgCi5ocy1mb3JtIGlucHV0W3R5cGU9JnF1b3Q7dGltZSZxdW90O10sIAouaHMtZm9ybSBpbnB1dFt0eXBlPSZxdW90O3dlZWsmcXVvdDtdLCAKLmhzLWZvcm0gaW5wdXRbdHlwZT0mcXVvdDtudW1iZXImcXVvdDtdLCAKLmhzLWZvcm0gaW5wdXRbdHlwZT0mcXVvdDtlbWFpbCZxdW90O10sIAouaHMtZm9ybSBpbnB1dFt0eXBlPSZxdW90O3VybCZxdW90O10sIAouaHMtZm9ybSBpbnB1dFt0eXBlPSZxdW90O3NlYXJjaCZxdW90O10sIAouaHMtZm9ybSBpbnB1dFt0eXBlPSZxdW90O3RlbCZxdW90O10sCi5ocy1mb3JtIGlucHV0W3R5cGU9JnF1b3Q7Y29sb3ImcXVvdDtdLAouaHMtZm9ybSBpbnB1dFt0eXBlPSZxdW90O2ZpbGUmcXVvdDtdLAouaHMtZm9ybSB0ZXh0YXJlYSwKLmhzLWZvcm0gc2VsZWN0IAogIHsKICB0ZXh0LWFsaWduOmxlZnQ7IG1hcmdpbjowOyB3aWR0aDo5OSU7IG1heC13aWR0aDozNzBweDsgaGVpZ2h0OjMwcHg7CiAgICAgICAgcGFkZGluZy10b3A6IDA7CiAgICBwYWRkaW5nLWJvdHRvbTogMDsKICAgICAgYm9yZGVyLWNvbG9yOiAjZDJkMmQyOwogICAgICBjb2xvcjogIzU0NTQ1NDsKICBib3JkZXI6IDBweCBzb2xpZCAjZDJkMmQyOwogICAgZm9udC1zaXplOiAxM3B4OwogIHBhZGRpbmc6IDhweCAxNXB4OwogIGJveC1zaXppbmc6IGJvcmRlci1ib3g7CiAgYmFja2dyb3VuZC1jb2xvcjogI2QyZDJkMjsKICBtYXJnaW4tYm90dG9tOjEwcHg7CiAgCiAgIH0KCmJvZHkgdGV4dGFyZWEgewogICAgbWluLWhlaWdodDogMTAwcHg7Cn0KICAKCiZsdDsvc3R5bGUmZ3Q7CiZsdDsvaHRtbCZndDsKCiZsdDtkaXYgaWQ9JnF1b3Q7aHNmb3JtQ29udGFpbmVyJnF1b3Q7Jmd0OwombHQ7IS0tW2lmIGx0ZSBJRSA4XSZndDsKJmx0O3NjcmlwdCBjaGFyc2V0PSZxdW90O3V0Zi04JnF1b3Q7IHR5cGU9JnF1b3Q7dGV4dC9qYXZhc2NyaXB0JnF1b3Q7IHNyYz0mcXVvdDsvL2pzLmhzZm9ybXMubmV0L2Zvcm1zL3YyLWxlZ2FjeS5qcyZxdW90OyZndDsmbHQ7L3NjcmlwdCZndDsKJmx0OyFbZW5kaWZdLS0mZ3Q7CiZsdDtzY3JpcHQgY2hhcnNldD0mcXVvdDt1dGYtOCZxdW90OyB0eXBlPSZxdW90O3RleHQvamF2YXNjcmlwdCZxdW90OyBzcmM9JnF1b3Q7Ly9qcy5oc2Zvcm1zLm5ldC9mb3Jtcy92Mi5qcyZxdW90OyZndDsmbHQ7L3NjcmlwdCZndDsKJmx0O3NjcmlwdCZndDsKICBoYnNwdC5mb3Jtcy5jcmVhdGUoeyAKICAgIGNzczogJiN4Mjc7JiN4Mjc7LAogICAgcG9ydGFsSWQ6ICYjeDI3OzMwMjE4ODAmI3gyNzssCiAgICB0YXJnZXQ6ICYjeDI3OyNoc2Zvcm1Db250YWluZXImI3gyNzssCiAgICBmb3JtSWQ6ICYjeDI3O2IwMDhiODIzLTBjYWQtNGY4Ny1hN2ViLTIxZWFmMTc0N2Y2MCYjeDI3OwogIH0pOwombHQ7L3NjcmlwdCZndDsKJmx0Oy9kaXYmZ3Q7CgoK[/fusion_code][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” border_style=”solid” padding_top=”20px” padding_bottom=”20px” admin_toggled=”yes” admin_label=”What does a typical secure development course look like?”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_3″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_text]

What does a typical secure development course look like?

Nettitude spent two days delivering a hands on course that clearly demonstrates common pitfalls that result in insecure code.

The course is typically modified to suit the specific requirements of the organisation receiving the training. For example, the programming languages used as examples and the vulnerabilities focuses on will vary. The following is an example where web application development and impact demonstrations were the primary concerns. Contact us to receive a syllabus unique to your requirements.

[/fusion_text][/fusion_builder_column][fusion_builder_column type=”1_2″ layout=”1_3″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_text]

DAY ONE

1. Tools used for web and general security assessment

  1. Intercepting proxies such as Burp Suite
  2. SSL Assessment Tools
  3. SQLMap
  4. Other general tools

2. OWASP Top 10

  1. Focusing on how these apply to (specific to client):
    • C#
    • HTML/JS
  2. Examples of real world attacks

3. Vulnerabilities not covered by OWASP Top 10

  1. Server Side Request Forgery
  2. Weak Password/Account controls
  3. Inappropriate use of cryptography

4. Advanced web vulnerabilities and platform specific flaws

  1. Angular JS Sandbox Bypass
  2. Unsafe Unserialisation
  3. Cross Origin Resource Sharing flaws
  4. dMongoDB misconfigurations

[/fusion_text][/fusion_builder_column][fusion_builder_column type=”1_2″ layout=”1_3″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_text]

DAY TWO

5. Dangerous Software Features

  1. Identification
  2. Examples of these exploited
  3. Mitigation strategies if removal is not possible

6. Attack Awareness

  1. How organisations are attacked focus on the following vectors:
    • Social Engineering (SE) – Phising and Internal SE
    • Outdated Software
  2. Detection
  3. Response
  4. Principle of least privilege

7. Post Exploitation

  1. Password hash cracking
  2. Data exfiltration
  3. Lateral movement

8. Mitigation against Social Engineering

  1. In-depth demonstration of Social Engineering attack
  2. Mitigating against:
    • Limiting social media exposure
    • Macro lockdown/signing
    • File associations

9. Capture the Flag[/fusion_text][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container admin_label=”Who will deliver the course?” hundred_percent=”no” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”#efefef” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” video_preview_image=”” border_size=”” border_color=”” border_style=”solid” margin_top=”” margin_bottom=”” padding_top=”20px” padding_right=”” padding_bottom=”20px” padding_left=”” admin_toggled=”yes”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_3″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_text]

Who will deliver the course?

Nettitude use only those security consultants who have experience as both developers and as security professionals to deliver secure development training.

[/fusion_text][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container][fusion_builder_container hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” border_style=”solid” padding_top=”20px” padding_bottom=”20px” admin_toggled=”yes” admin_label=”How will the training be delivered?”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_3″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_text]

How will the training be delivered?

Nettitude understands that ‘death by PowerPoint‘ is neither an engaging or useful means of knowledge transfer.  There is real power in allowing students to arrive at their own “aha!” moment and so that is how the training is designed to be delivered.

The training is very practical in nature; developers will be taught the art of offense as well as defence in order to help cement the impact of insecure coding practises in their mind. Often, the training takes on a competitive nature too – indeed, the course ends with a friendly competition which pits the developers against each other.

Although each course is tailored to suit the requirements of the organisation, Nettitude’s trainers are well equipped to ‘go off road’ and take the delivery in whatever direction is of most benefit to the delegates, as their strengths and weaknesses emerge. This may mean spending more or less time on a given topic than originally anticipated or it might even mean the delivery of content not originally planned for.

With all of that said, the objectives of the course are laid out at the very beginning of the process and Nettitude will always ensure that those objectives are met.

[/fusion_text][/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]