Get Q/ualified!

Q/SSE® Qualified/ Software Security Expert Certification Bootcamp



Everyone, no matter what software you write, software protocols, internal processes or you're responsible for secure programming. You all need to know secure coding techniques that minimize the adverse effects of SQL or other malicious hacker attacks on code.

This class is for everyone! If you want to learn how add Microsoft's SDL, sanitize inputs and test code this class is for you, if you write code this class is for you because everyone needs to know software security and how to BREAK & FIX software.

Committee on National Security SystemsThis 3-part, 5day class delivers the best of all of the Qualified Software Security Expert classes and more. It includes items that are defensive in nature (e.g. checking error return codes before using, other data structures that should have been created, or protecting against using a pointer after it has been released), process-related and risk- related, hacking and XSS . Also included are items on how to prevent attacks with a step-by-step process how to FIX software with counter measures that protect your code.

Passing the Q/SSE classes and exams qualifies you to take the Q/SSE exam. The Q/SSE exam is made up questions you have seen from the Q/SSE classes that you take before the Q/SSE 100 multiple choice EXAM. Or you can Master the Q/SSE EXAM without taking any Q/SSE classes by passing the Q/SSE exam with a 80 or better and prove you have mastered the tactical software security skills labs from each Q/SEE class that proves your "qualified" for the job.



Class Price: $2,995
Time: 8:00 am -5pm
Location: check schedule
Prerequisites: Understanding of TCP/IP protocols
CPE Credits: 40
Instructor: Highly qualified Software Security instructors, actively involved in the Application Security community

Method of Delivery - Residential On Ground
Method of Evaluation: 1. 95 % attendance 2. 100 % completion of Lab
Grading: Pass = 95% Attendance and 100% Completion of Labs and Practical
Fail => 95% Attendance and > 100% Completion of Labs and Practical

Learning Level: Basic Programmer - Intermediate Programmer to Advanced

Who Should Attend

Software testers, software developers, development and test managers, security auditors and anyone involved in software production for resale or internal use will find it valuable. Information Security and IT managers; Information Assurance Programmers; Information Security Analysts and Consultants; Internal Auditors and Audit Consultants; QA Specialists.



What Is CWE? Want more info on CWE?
Click here for: What is CWE? PDF
Targeted to developers and security practitioners, CWE is a formal list of software weaknesses, idiosyncrasies, faults, and flaws created to:

•  Serve as a common language for describing the source code, software design, or software architecture causes of software security vulnerabilities.
•  Serve as a standard measuring stick for software security tools targeting these issues.
•  Provide a common baseline standard for identification, mitigation, and prevention of these weaknesses.

I.  Intro to Software Security

Common Software Coding and Design Errors and Flaws
Students will learn about the range of software development errors and flaws that create application security, reliability, availability and confidentiality failures. Specifically in this section we will deal with those vulnerabilities that are common across language implementations (C, C++ and Java). For each vulnerability type, the course will cover real-world examples illustrated in code - of failures along with methods to find, fix and prevent each type of flaw.

PART A

System-Level

Data Issues

Information Disclosure

On the Wire

Tools

II.  Web Vulnerabilities .   The web is different. We will address common web vulnerabilities, how to find them, how to prevent them.

Web sites

III.  Defensive Coding Principles

This section is designed to educate developers and testers on the general principles of secure coding. This includes a historical perspective on software failure, when good design goes bad, and 18 defensive coding principles to live by.

IV.  Security Testing and Quality Assurance

This includes the difference between functional and security testing, understanding and application's entry points, and spotting three classes of security bugs: dangerous inputs, rigged environment and logic vulnerabilities.

Each section will have an in depth hands on lab

PART B

Gathering information on the target

Attacking the client

A attacking State

Attacking Data

Attacking the server

Web Services

Privacy

Tool support

Hands-on lab attacking vulnerable targets

PART C

Live vulnerability and exploit tour! This is the core of the class. In this section, attendees will go through a wide range of software vulnerabilities and labs to show sample exploits of these vulnerabilities live. Labs include: cross-site scripting, SQL injection, buffer overflows, format string vulnerabilities, and many others software vulnerabilities. Attendees gain awareness and key insights into these vulnerability type, the ease with which the attacker community can exploit them and what to do to prevent these critical attacks. check out the OWASP Top Ten Project


You'll use open source tools from OWASP in class - OWASP Tools Project

Tools and Threats.   The threat is growing and so is the number of tools that lower the bar for attackers. This section takes the attendees inside the underground world of the attacker tools.

Thinking Like the Attacker: Threat Modeling.  A critical step in securing software or system is to methodically think through threats. In this section we present several techniques for threat modeling and also walk the audience through the process of modeling threats against several systems.

Incorporating Threats Into Software/System Design, Development, Testing and Deployment. By thinking about threats at each stage of the development lifecycle, we can make software and systems that are more resilient to attack. Attendees will walk away with an introduction to tools and techniques to build security in.

We sneak in Reverse Engineering too!

*Class fees are subject to change

View Class Schedule