Add your offcanvas content in here

The Company

Simplifying your IT-security journey.

Best Practices for Secure Web Applications

This basic training provides a comprehensive introduction to Web Application Security and conveys a self-contained, in-depth concept for establishing sustainable security for web applications, websites, and web servers.

This training provides answers to the following questions

  • What security threats are web applications exposed to?
  • Why is it necessary for security to encompass the entire software development process?
  • How do I get started with secure development?
  • Where can I find help for self-help?

Headline 3

Text 3

The seminar incorporates the groundbreaking work of the OWASP (Open Web Application Security Project). The content goes far beyond the widespread standard of the OWASP Top 10. Particular emphasis is placed on the practicality and feasibility of the measures described.

Solution approaches for programming, software, and system architecture are provided as generic patterns that can be easily adapted to your own environment. This enables participants to create secure web applications, analyze and evaluate existing applications for fundamental security-relevant vulnerabilities, and derive appropriate measures.

Exercises

We use our comfortable mobile training environment. The vulnerabilities are understood by the participants by solving specific tasks and then discussed in the group. By using their own laptops, the participants work in their usual working environment.

Course content

Contents

Course contents at a glance

  • HTTP Fundamentals
  • Authentication/Authorization, Access Control
  • Sessions, Cookies, Dom Storage, JWT
  • SOP, CORS
  • Security Headers (CSP, HSTS, etc.)
  • Cryptography (Fundamentals, SSL/TLS, Certificates, etc.)
  • SOAP, JSON
  • XSS (reflected, stored, dom-based)
  • Injection (SQL, LDAP, XML, Code, …)
  • Object Deserialization
  • CSRF, Clickjacking
  • JSONP Hijacking, CORS Misconfiguration
  • XML External Entity Includes
  • Logical/Semantic Attacks, Phishing
  • Network Separation, Firewalls, WAFs
  • Input Validation, Output Encoding
  • Anti-Automation
  • Best Practices of Programming
Details

This training is aimed at companies and organizations. It is individually tailored to your requirements and the team's prior knowledge and can be carried out in-house or online. This training can be economical from as few as three participants.

Duration and format

  • 2 to 5 days, individually tailored
  • On-site or online training
  • Working environment: NinjaDVA

Prerequisites

None

Bonus

Bring your own code

Provide us with any of your own code in advance. We will prepare the training content in such a way that your code can be used as an object of investigation and demonstration material during the training. This makes the training more vivid and, in addition to learning the subject in a very practical way, the participants benefit directly from the identification and discussion of real vulnerabilities in their own application.

This is where the accordion text goes

Our trainers

Our promise: from practice, for practice & always up to date. That's why all our trainers are active experts with many years of experience in the subject area they teach.

Bastian Braun is a Senior Consultant IT Security at mgm security partners. He works on the development of secure web applications using agile processes, leads seminars for developers, project managers and penetration testers, performs product and security analyses, and advises clients on all aspects of web security.

He has been involved in web security for more than 15 years from an academic research perspective and as applied best practice. He particularly enjoys transferring academic research results into everyday industrial practice. He is a board member of the German OWASP Chapter and a regular speaker at relevant conferences.

Benjamin Kellermann is an information security consultant and penetration tester at mgm security partners in Dresden. Since 2004, he has been intensively involved in information security and conducted research on secure web applications at the Chair of Data Protection and Data Security with Prof. Andreas Pfitzmann. For several years he taught in the field of information security and is a speaker at numerous conferences. Through many security audits and penetration tests, Mr. Kellermann has the necessary expertise to address even technically very detailed questions.

Mirko Richter is an SSDLC consultant, SAST specialist, penetration tester and branch manager at mgm security partners in Dresden and has many years of experience as a developer, project manager and architect.
He has in-depth know-how and experience in hardening software solutions in the web-based area. In order to maintain this know-how, he is still actively involved in software projects alongside his consulting work and can therefore respond to relevant questions in great detail.

Mirko Richter

Björn Kirschner is an information security consultant and penetration tester at mgm security partners in Munich. Björn can look back on many penetration tests of a wide variety of technologies (web applications, mobile apps, network infrastructure, servers, ...). In addition to seminars, he conducts source code analyses and advises clients on many aspects of web application security, especially within the framework of a secure development process.

Reinhard Böhme is an experienced IT security consultant and trainer with a broad technical background and practical expertise in penetration testing (Web, Mobile, Infrastructure, Host Audits, ASVS) and cloud security (Azure, AWS). He combines in-depth knowledge of modern cloud infrastructures and information security with practical experience, making complex security topics practical and interesting for his seminar participants.

Your Benefit

Our training courses not only impart knowledge, they also change mindsets. Your developers will learn to identify security vulnerabilities early on and avoid them in a targeted manner. The result: more robust applications, more confidence - and a clear advantage in everyday project work.

All trainers are actively working Security Consultants. They contribute their experience with everyday problems, which often conflict with security requirements, and thus contribute to a pragmatic, realistic approach to security.

  • Practical methods instead of theory to avoid typical security gaps in web applications and mobile apps.
  • Content according to the latest standards by actively working, experienced Security Consultants.
  • Secure coding for long-term maintainability and quality of the source code.
  • Increased security awareness in the team prevents pitfalls at an early stage.
  • Protection against liability risks & damage to reputation.

Dr. Benjamin Kellermann

»Let's discuss your requirements for an Application Security basic training for your team.«