Intermediate

Security Testing

Scademy

After getting familiar with the vulnerabilities and the attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities. Security testing should start with information gathering about the system (ToC, i.e. Target of Evaluation), then a thorough threat modeling should reveal and rate all threats, arriving to the most appropriate risk analysis-driven test plan.

Who Should Attend

  • Testers and QA staff
  • Security professionals
  • Developers interested in security testing
  • Anyone responsible for application security testing

Prerequisites

  • General Web application development

What You Will Learn

  • Understand basic concepts of security, IT security and secure coding
  • Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
  • Learn about XML security
  • Learn client-side vulnerabilities and secure coding practices
  • Understand security testing approaches and methodologies
  • Get practical knowledge in using security testing techniques and tools
  • Learn about source code review techniques
  • Understand input validation security
  • Learn about improper use of security features
  • Learn about testing the implementation
  • Learn how to set up and operate the deployment environment securely
  • Understand principles of security and secure coding
  • Get sources and further readings on secure coding practices

Course Outline

Labs & Practical Exercises

Security evaluations can happen at various steps of the SDLC, and so we discuss design review, code review, reconnaissance and information gathering about the system, testing the implementation and the testing and hardening the environment for secure deployment. Many different security testing techniques are introduced in details, like taint analysis and heuristics-based code review, static code analysis, dynamic web vulnerability testing or fuzzing. Various types of tools are introduced that can be applied in order to automate security evaluation of software products, which is also supported by a number of exercises, where we execute these tools to analyze the already discussed vulnerable code. Many real life case studies support better understanding of various vulnerabilities.

Certification & Assessment

Certificate of Completion. This course prepares testers and QA staff to adequately plan and precisely execute security tests, select and use the most appropriate tools and techniques to find even hidden security flaws, and thus gives essential practical skills that can be applied on the next day working day.

Computrain

Empowering defenders. Securing tomorrow. Expert-led cybersecurity training that transforms threats into opportunities.

Training Partners

Contact

  • info@computrainlearning.com
  • 22441540
  • Nicosia, Cyprus

© 2026 G.T.P. Computrain Ltd. All rights reserved.

Privacy Policy

Cookie Consent

We use cookies to enhance your browsing experience, analyse site traffic, and personalise content. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Privacy Policy.