Intermediate

Application Security for Developers

NotSoSecure

The future of secure software development depends on developers who understand how to design, build, and maintain secure applications. This intensive two-day course provides developers, architects, and tech leads with practical skills to identify and remediate vulnerabilities in their code. Through interactive labs and real-world scenarios, learners will explore modern application security practices and learn to apply threat modelling techniques using the STRIDE methodology.

Who Should Attend

  • Software developers at junior, mid, or senior levels
  • Technical leads and software architects responsible for secure design
  • Development teams seeking to embed security within their software lifecycle
  • Teams managing both legacy and modern applications
  • Those wanting to integrate secure practices into Agile or DevOps workflows

Prerequisites

  • Basic understanding of software development concepts
  • Familiarity with at least one programming language
  • Understanding of web application architecture
  • No prior security experience required

What You Will Learn

  • Why secure development is essential in modern software environments
  • Understanding the OWASP Top 10 and common developer pitfalls
  • Core threat modelling concepts and the STRIDE framework
  • Securing authentication and authorisation mechanisms
  • Protecting data at rest and in transit
  • Identifying and mitigating common vulnerabilities (XSS, SQL injection, IDOR)
  • Conducting secure source code reviews
  • Integrating security requirements into Agile workflows

Course Outline

Labs & Practical Exercises

This course includes extensive hands-on activities, including: Practical threat modelling of real application features, exploiting and remediating more than ten common vulnerabilities using professional security tools, reviewing and securing insecure code in sandboxed environments, simulated red-team exercises led by experienced penetration testers, and a final capture the flag challenge to reinforce and test learning outcomes.

Certification & Assessment

There are no formal exams in this course. Instead, learners complete interactive labs, practical challenges, and a competitive capture the flag activity to test their skills. Knowledge checks and guided discussions ensure participants can apply their learning to real-world projects. Certificate of Completion provided.

Computrain

Empowering defenders. Securing tomorrow. Expert-led cybersecurity training that transforms threats into opportunities.

Training Partners

Contact

  • info@computrainlearning.com
  • 22441540
  • Nicosia, Cyprus

© 2026 G.T.P. Computrain Ltd. All rights reserved.

Privacy Policy

Cookie Consent

We use cookies to enhance your browsing experience, analyse site traffic, and personalise content. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Privacy Policy.