We offer web security training courses for primarily two target audiences: First, developers who want to learn about web application security, single sign-on, TLS, XML, and web service technologies. Second, penetration testers who want to get an in-depth knowledge about web security. Our discussed topics are both known, and also usually unknown attacks, along with their countermeasures. Furthermore, we go into detail regarding solutions to automate security tests.
Next Online Training Courses
Our Training Portfolio
Master the design and implementation of your complex Identity and Access Management (IAM) scenarios thanks to this interactive training. Learn which standards from the OAuth and OpenID Connect universe will help you. Realize secure, future-oriented and interoperable solutions.
Become familiar with the two single sign-on standards OAuth and OpenID Connect and learn what opportunities the two methods offer you to improve the login of your application.
Using real-life examples, you will learn about critical topics such as SQL injections, remote file inclusion and cross-site scripting. The goal of this comprehensive seminar is to enable you to understand and evaluate common attacks and to perform small audits on your own. This will allow you to secure your web application for the future.
Understand the complexity of single sign-on standards and potential threats when using OAuth and OpenID Connect to log in. Interactive exercises will help you understand serious attacks and appropriate countermeasures to optimally secure your own SSO implementations.
The use of the widely used single sign-on procedure SAML allows to simplify the login of your application. In this training course, you will learn how to optimize your implementation and prevent attacks which allow hackers to gain access to confidential data.
During this training, you will learn which risks your web services are exposed to and how you can prevent attackers from extracting and decrypting confidential data. Complex XML standards offer hackers a large attack surface if they are incorrectly configured and can lead to serious attacks.