Many of us are working from home, and adapting to a new reality. Software Secured and Reshift Security have partnered to bring newly remote teams together to work towards a goal of securing their code.
We are helping software development teams adapt to the new norm, learn new skills and get out of these uncertain times with both stronger teams and stronger applications.
This free 10 week course will walk developers through 10 application security attacks and how to remediate them (1 new vulnerability each week). Attendees will get actionable tips, tools and insights on how to write more secure code.
Let’s work together to ensure the security of your software remains a priority.
Looking forward to securing more code together!
Join webinar here —> https://zoom.us/webinar/register/WN_5yoKTH3FQfW09a4Z3IoHkw
About the Instructor:
Sherif Koussa is an OWASP Ottawa Chapter Co-Leader, Software Developer, Hacker, and Secure Coding Instructor. Sherif began his security career as the lead developer for OWASP WebGoat 5.0, and served as a mentor for SANS Institute and exam consultant for GIAC, where he authored more than 500 Java and .NET questions. He also worked for Wells Fargo Bank in the central security code review team.
100 million lines of code later, Sherif brings lessons learned from writing insecure code as a developer, along with years of experience as a security code review engineer and pen-tester, finding vulnerabilities in custom code.
Sherif is also CEO and founder of Software Secured (https://www.softwaresecured.com) and Reshift Security (https://www.reshiftsecurity.com). Software Secured specializes in Penetration Testing as a Service (PTaaS) and instructor-led training. Reshift Security is a developer-first security tool that automates the process of finding and automatically fixing vulnerabilities in custom code.
Who is this suited for?
1. CTO, Technical lead, or CEO interested in security:
Offload your team’s security education to our team of experts
Engage your developers while your team is dispersed and finding a new path forward
Continue being proactive with your security program
10 hour of hands on experience finding and fixing vulnerabilities in your code
Get your projects to zero critical vulnerabilities
Know the latest developer-first security tools and trends
April 10th: Injection
April 17th : Broken Authentication
April 24th: Sensitive data Exposure
May 1st : External Entity Injection
May 8th : Broken Access Control
May 15th: Security Misconfiguration
May 22nd: Cross-site Scripting
May 29th: Insecure Deserialization
June 5th: Using Components with Known Vulnerabilities
June 12th: Insufficient Logging and Monitoring