Event Information
About this Event
Many of us are working from home, and adapting to a new reality. Software Secured and Reshift Security have partnered to bring newly remote teams together to work towards a goal of securing their code.
We are helping software development teams adapt to the new norm, learn new skills and get out of these uncertain times with both stronger teams and stronger applications.
This free 10 week course will walk developers through 10 application security attacks and how to remediate them (1 new vulnerability each week). Attendees will get actionable tips, tools and insights on how to write more secure code.
Let’s work together to ensure the security of your software remains a priority.
Looking forward to securing more code together!
Join webinar here ---> https://zoom.us/webinar/register/WN_5yoKTH3FQfW09a4Z3IoHkw
About the Instructor:
Sherif Koussa is an OWASP Ottawa Chapter Co-Leader, Software Developer, Hacker, and Secure Coding Instructor. Sherif began his security career as the lead developer for OWASP WebGoat 5.0, and served as a mentor for SANS Institute and exam consultant for GIAC, where he authored more than 500 Java and .NET questions. He also worked for Wells Fargo Bank in the central security code review team.
100 million lines of code later, Sherif brings lessons learned from writing insecure code as a developer, along with years of experience as a security code review engineer and pen-tester, finding vulnerabilities in custom code.
Sherif is also CEO and founder of Software Secured (https://www.softwaresecured.com) and Reshift Security (https://www.reshiftsecurity.com). Software Secured specializes in Penetration Testing as a Service (PTaaS) and instructor-led training. Reshift Security is a developer-first security tool that automates the process of finding and automatically fixing vulnerabilities in custom code.
Who is this suited for?
1. CTO, Technical lead, or CEO interested in security:
- Offload your team’s security education to our team of experts
- Engage your developers while your team is dispersed and finding a new path forward
- Continue being proactive with your security program
2. Developers
- 10 hour of hands on experience finding and fixing vulnerabilities in your code
- Get your projects to zero critical vulnerabilities
- Know the latest developer-first security tools and trends
Course Schedule:
- April 10th: Injection
- April 17th : Broken Authentication
- April 24th: Sensitive data Exposure
- May 1st : External Entity Injection
- May 8th : Broken Access Control
- May 15th: Security Misconfiguration
- May 22nd: Cross-site Scripting
- May 29th: Insecure Deserialization
- June 5th: Using Components with Known Vulnerabilities
- June 12th: Insufficient Logging and Monitoring