Security code reviews play an important role in the development of secure systems. Early detection of vulnerabilities through code reviews helps detect security flaws at a stage when their correction is still relatively easy and inexpensive – before they become vulnerabilities built into the system.
This hands-on training covers common automated and manual techniques that enable reviewers to detect and identify security vulnerabilities resulting from flaws such as input validation, authentication and authorization, session management, cryptography and key management, error handling, security configurations, network architecture, and vulnerabilities related to business logic.
Duration: | One day |
Type: | Lecture and hands-on training |
Recommended group size: | Up to 30 participants |
Target audience: | Software development and technical QA team members |
Prerequisites: |
|