Get in touch

Loading...

We use HubSpot CRM to process and manage contact and information requests. Please accept the "Functional Cookies" and reload the page to load the contact form.
Expertise / Academy / Cybersecurity & access management

OWASP Top 10 Training

Thinking like a hacker

1 day Remote
Inquire now

Challenges

The requirements for IT security are growing with the degree of digitalization. This is a situation that poses challenges for many companies. For hackers don’t stand still: They constantly develop – and they are researching new tools and ways to penetrate digital infrastructures.

Anyone who wants to protect their IT infrastructure has to know where the weak points on-site are and be familiar with potential attackers. Defensive strategies can only be effective if you can assess the threats realistically and if you know the attackers’ methods and procedures. The key to building experience and knowledge in the cybersecurity sector is the ability to imagine yourself practically in the attacker’s shoes.

Goal

Think like a hacker: Revealing the 10 most common security gaps in web applications – and preventing them.

In this workshop, the AOE Academy will present the OWASP TOP 10 and explain the list of the 10 most common attack vectors using practical examples in the programming languages Java, PHP, Go, and Python. In addition, you can do interactive exercises in our OWASP lab and thereby gain some real hands-on experience.

Target groups

All developers

Contents

Hands-on training, interactive lab & live hack: In the course of the training, the individual types of security gaps will be examined and traced and tried out in the OWASP lab. With the interactive OWASP LAB, participants can complete exercises on the topics and gain practical experience.

Workshop structure:

Overview of the OWASP TOP 10
Security Misconfiguration
Injection
Broken Authentication
Insufficient Logging & Monitoring
Broken Access Control
Sensitive Data Exposure
Cross-Site Scripting(XSS)
Using Component with known vulnerabilities
Insecure Deserialization
XML External Entities
I noticed something unusual. What now?
Martin Eckes

Martin Eckes

Project managers for the management / microtech GmbH
Optimal balance of specialized knowledge and practical examples! Thanks to the OWASP lab’s virtual test environment, our employees were able to apply what they learned practically right away and gain valuable experiences for their day-to-day work. The training is a must-have for developers!
Bastian Ike

Our Trainer: Bastian Ike

Bastian Ike is Security Division Lead on AOE’s Cybersecurity Team. For years, AOE has successfully helped companies implement IAM systems, keycloak projects, penetration tests, DevSecOps, and security in microservice architectures.

Contact us
for a non-binding offer

Loading...

We use HubSpot CRM to process and manage contact and information requests. Please accept the "Functional Cookies" and reload the page to load the contact form.