This two-day course is for people who want to understand the technical controls used to prevent software vulnerabilities. It focuses on common insecure coding practices and examines how these can be addressed to make secure applications.
Have you completed this course? Click below to add to your LinkedIn profile
How will I benefit?
With this course, you will:
- Have access to a purpose built controlled environment specifically created to demonstrate the main areas of vulnerability and the key mitigation strategies
- Get the chance to practise techniques to address common insecure coding practices
- Build your skills and confidence in coding secure applications
For more information on this course, please email the Education team or contact us on +44(0)1763 285285