Page tree
Skip to end of metadata
Go to start of metadata

MOTTO

Producing secure code for applications is a key aspect of protecting GÉANT applications and systems. With the move towards multi-domain systems and services there is a greater emphasis on securing these multi-domain systems as well as ensuring secure deployment of them. The Secure Coding Training focuses on areas that affect the development and analysis of application's source code!

Secure Coding Training 2019 (SCT19)

"Producing Bullet-Proof Software for your Infrastructure"


TOPICS:

  • OWASP Application Security Verification Standard v. 4.0
  • Implementing the most recent authentication and authorization methods
  • New or improved security tools for the developer teams

ATTENDED BY:

16  INDIVIDUALS               8  NRENs

From the participants:

“Best practices (development, testing, deployment, workflows and concepts on type of attacks and some known/recent threats”


"More knowledge about GEANT project training resources, better knowledge about the state of projects participants skills"


"Knowledge, which was the main reason why I decided to participate. The training does not make me an expert in security, but it will help me in the future when it comes to security related issues" 

 

"Good concepts, info about best practices with tested examples. The subject is dense and the trainers made an effort to transmit these concepts in an easy and enjoyable way"

Secure Coding Training 2020 (SCT20)

"Different this time and... it is happening!"


TOPICS:

  • Secure programming in JavaScript 

    • JavaScript security issues

    • A crisis of Trust

    • Not hidden code

    • XSS vulnerability

    • Poor validation

    • Cryptless

    • Quality code

    • Weak types & poor code quality

  • Secure Code Training 

    • Threat modeling

    • Continuous Integration and Secure Software Development Life Cycle

    • HTTP Security Headers

    • Modern secure authentication and authorization mechanisms

    • The most popular attacks against Web applications

    • API Security

ATTENDED BY:

20  INDIVIDUALS               10  NRENs

From the participants:


  • No labels