Secure Development Training
What does the cyber security threat landscape look like now, and how will that change in in the future? Secure Development training helps your developers to understand where most threats are likely to occur, and what you can do to mitigate their risk. Zacco’s Digital Trust practice can support your development team through cyber security fundamentals training. We can build the high level of security and threat awareness that is crucial in developing a secure product, system, application or user experience.
Secure Development Training is designed to teach core knowledge of cyber security best practice. Your secure developers will learn to understand security application during the development process, common security risks and how they can be exploited, and what can be done to mitigate impact risk.
The course can be tailored to fit your particular audience, expectations and desired outcome, and includes the following sections:
Introduction to Cyber Security
What are the risks if we don’t secure our product?
- Understanding cyber security and the current global threat landscape
- Security breaches at other companies – How did they happen and what was their impact?
Securing your product with OWASP
Using cyber security best practice to create a secure product?
- What is OWASP and why it is important for architects and developers
- Walkthrough of OWASP 10 most important ‘Proactive Controls’
- Discuss how you can implement controls into every project
- Watch live exploit demonstrations of some of the OWASP top 10 risks
Cyber Security technology deep dive
Presentations on a selection of interesting and important security topics:
- Understanding risk assessment and prioritisation
- password handling and other defensive strategies
- How does a hacker think? Where are your systems most vulnerable?
Workshop: Capture the flag
A contest designed to challenge attendees by solving cyber security issues, where the goal is to identify and exploit different security risks within a controlled environment.
- Advanced attendees can compete against each other for the highest score on a leaderboard
- Attendees new to cyber security will work together in pairs to solve simpler challenges (in pairs)
- Designed to demonstrate some of the session topics in practice.
The sessions close with a summary of the training and key take aways for attendees
Learn more about how our Secure Development training can help your teams to understand and implement cyber security best practice? Get in touch!





