Secure by Design Training in Norway

  • Learn via: Classroom / Virtual Classroom / Online
  • Duration: 2 Days
  • Level: Fundamentals
  • Price: From €3,113+VAT
We can host this training at your preferred location. Contact us!

With the increase in cybercrime and threat actors targeting web applications and software vulnerabilities as a route to exploit business, it's crucial to build security into new systems developments processes right from the start. Most successful cyber-attacks still depend on exploiting a few well-known common vulnerabilities. The Open Worldwide Application Security Project (OWASP) has recently released a valuable resource shedding light on the top 10 vulnerabilities that frequently plague large language model (LLM) applications. These vulnerabilities, such as prompt injections, data leakage, inadequate sandboxing, and unauthorized code execution, have the potential to significantly impact LLM systems and operations. This course, updated with the latest OWASP Top 10, will show you how security can be designed into, managed and maintained within a development lifecycle. Learn about the challenges of Artificial Intelligence (AI) generated software, and how to build security into AI systems at the outset.

There are no specific pre-requisites for this course.

Note: This course does not cover hands-on coding. Additional courses can be found in our Application Security and Secure Coding learning pathways.

  • Understand the main Secure Development Lifecycle (SDLC) Models, and their principal differences
  • Be able to choose which SDLC model is most appropriate in a given situation.
  • Learn how to apply secure development techniques from the initial design stage and throughout a development lifecycle
  • Understand the latest (2021) OWASP vulnerabilities and how to counter/mitigate them
  • Learn about useful system design tools
  • Discover resources to help introduce and use secure design and development best practices
  • Learn Threat Modelling methodologies and techniques
  • Understand the benefits of code review
  • Understand various testing strategies
  • Learn about encryption, securing and compromising passwords and meta data
  • Understand the challenges of AI generated software
  • Discover the benefits and pitfalls of GitHub Co-pilot
  • Understand the OWASP Top 10 for Large Language Models (LLM)
  • Learn about the future AI security challenges for Secure by Design

Module 1 - Secure Development Lifecycle (SDLC)

  • An overview of the main SDLC models
  • Development models
    • DevOps
    • DevSecOps
  • Configuration and source code management
    • Integrated teams
    • Securing the software environment
    • API security
  • Risk analysis tools

Module 2 - Secure By Design

  • Secure development processes
  • Threat modelling
    • Identify Assets
    • Create Architecture Overview
    • Decomposing Applications
    • Identify, Document and Rate the Threats
  • Practical Threat Modeling
    • STRIDE
    • Attack Trees
  • Risk mitigation in the Supply Chain
    • Supply Chain Mapping
    • Trust boundaries
  • Security best practice
    • Least Privilege
    • Reducing the Attack Surface
    • Input Validations
    • Defence in Depth
  • Security Patterns & Models
    • System Design Tools
    • Secure design architecture

Module 3 – Introduction to Application Security (OWASP 2021)

  • Vulnerabilities and mitigations available to any development environment
  • Attack vectors and security controls
  • OWASP Top Ten 2021
    • Broken Access Controls
      • What’s the risk?
      • Case study
      • Insecure direct objects
      • Authorisation issues
      • Indirect references
      • Function level access
      • Security trimming
      • Risky URL patterns – when not to secure by URL
      • Protecting static resources
    • Cryptographic Failures
      • What’s the risk?
      • Case study
      • Alternatives to holding data
      • Minimising the risk of encrypted data exposure data
      • Storing sensitive data
      • Machine in the middle attacks
      • Employing HSTS
    • Injection
      • What’s the risk?
      • Case study
      • Allow lists
      • Parameterisation
      • Object relational mapping (ORM)
      • Cross site scripting (XSS)
      • Payload obfuscation
      • Other injection risks
    • Insecure Design
      • What’s the risk?
      • Case study
      • Secure design
    • Security Misconfiguration
      • What’s the risk?
      • Case study
      • Insecure cloud buckets
      • Error messages
      • Handling error codes
      • Config files and sensitive data
      • Google dorks to find config files
    • Vulnerable and Outdated Components
      • What’s the risk?
      • Case study
      • Log4Shell
      • Components with known vulnerabilities
      • Identifying old frameworks and libraries
    • Identification and Authentication Failures
      • What’s the risk?
      • Case study
      • Stateless protocol
      • Persisting session state in HTTP
      • Session sates – secure by default
      • Minimising timeouts
    • Software and Data Integrity Failures
      • What’s the risk?
      • Case study
      • XML processing
      • Leveraging XXE to conduct intrusions and attacks
      • XXE prevention
      • Insecure deserialisation
      • Java object serialisation
      • Data integrity
      • Software integrity
      • Integrity controls
    • Security Logging and Monitoring Failures
      • What’s the risk?
      • Case study
      • Logging best practice
      • Security logging and monitoring failures
      • What should and shouldn’t be logged?
    • Server-Side Request Forgery (SSRF)
      • What’s the risk?
      • Case study
      • Payload injection
      • XPSA – port scanning on the server
      • Malicious attacks from the inside
      • Exploit chaining
  • OWASP Top 10 Proactive Controls
  • OWASP Application Security Verification Standard

Module 4 – Securing Modern Applications & AI

  • Code Review
  • Code Testing
    • Interface testing
    • Testing integration in CI/CD
  • Encryption
    • Defending encryption
    • Hashes and passwords
  • AI Security for Secure by Design
    • Challenges of AI generated software
      • Debugging and troubleshooting
      • Adaptability and customisation
    • GitHub Co-pilot
    • OWASP Top 10 for Large Language Models (LLM)
      • LLM01 – Prompt injections
      • LLM02 – Insecure output handling
      • LLM03 – Training data poisoning
      • LLM04 – Denial of service
      • LLM05 – Supply chain
      • LLN06 – Permissions issues
      • LLM07 – Data leakage
      • LLM08 – Excessive agency
      • LLM09 – Overreliance
      • LLM10 – Insecure plugins
  • Future AI security challenges

Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Norway facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
18 juni 2024
Oslo, Bergen, Trondheim
2 Days
Classroom / Virtual Classroom
22 juni 2024
Oslo, Bergen, Trondheim
2 Days
Classroom / Virtual Classroom
25 juni 2024
Oslo, Bergen, Trondheim
2 Days
Classroom / Virtual Classroom
02 juli 2024
Oslo, Bergen, Trondheim
2 Days
Classroom / Virtual Classroom
08 juli 2024
Oslo, Bergen, Trondheim
€3,113 +VAT Book Now
Classroom / Virtual Classroom
10 juli 2024
Oslo, Bergen, Trondheim
2 Days
Classroom / Virtual Classroom
24 juli 2024
Oslo, Bergen, Trondheim
2 Days
Classroom / Virtual Classroom
06 august 2024
Oslo, Bergen, Trondheim
2 Days

Related Trainings

Secure by Design Training Course in Norway

The Nordic country Norway, is in Northern Europe. Known for its stunning natural beauty, including fjords, mountains, and forests, Norway is also famous for its high standard of living and strong social welfare system. Norway's capital and largest city is Oslo. Tromsø, Bergen, Trondheim and Stavanger are the other tourist attracting cities of Norway.

Norway is a constitutional monarchy with King Harald V as the head of state. The country has a population of 5,425,270 as of January 2022. Norway is a relatively small country and has a relatively low population density, with much of its land area covered by forests, mountains, and fjords. Despite its small size, Norway is known for its rich cultural heritage, strong economy, and stunning natural beauty, which attracts millions of visitors every year. This Nordic country is also known for its winter sports, such as skiing and snowboarding, and is a popular destination for outdoor enthusiasts.

Norway has a long history of invention and is home to numerous more top-tier tech firms and research facilities, such as; Kongsberg Gruppen, Telenor, Atea, Evry and Gjensidige Forsikring.

Due to the country's high latitude, there are large seasonal variations in daylight. From late May to late July, the sun never completely descends beneath the horizon. Which attracts many tourists around the world to see the "Land of the Midnight Sun". Tourists mainly visit Sognefjord, Norway's Largest Fjord, Pulpit Rock, one of the most photographed sites in Norway and of course the capital; Oslo.

Oslo is considered the business center of Norway. It is the country's largest city and the capital of Norway. The city is home to many of Norway's largest and most important companies, as well as several international organizations and research institutions. Additionally, the city is a popular tourist destination, known for its scenic location on the Oslo Fjord, its many museums and cultural attractions, and its vibrant nightlife and dining scene. Some of the most popular museums in Oslo are The Norwegian Museum of Cultural History, The Nobel Peace Center, The National Museum of Art, Architecture, and Design, The Munch Museum and The Vigeland Museum.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.