This training module provides insights into a hacker’s perspective of software development. It focuses on general cyber security concepts and common application-level attacks. By examining software from a hacker’s perspective, participants get a chance to see how decisions they make during the design, development, and deployment stages translate into secure or vulnerable systems.
Covered topics include authentication and authorization mechanisms, code injection, denial-of-service (DoS) attacks, information leakage, cryptography, and mitigation techniques.
Duration: | One day (may be split into two half-day sessions) |
Type: | Lecture with live demonstrations |
Recommended group size: | Up to 30 participants |
Target audience: | Software development team members |
Prerequisites: |
|