Training: Security for Developers
This training is specifically designed for software developers and DevOps teams who are responsible for building and maintaining applications on a daily basis.
You will not only learn what risks exist, but also how real hackers operate. An experienced ethical hacker will introduce you to the way attackers think and work, so that you gain insight into how vulnerabilities arise and can be abused. With this knowledge, you can better secure your applications and proactively tackle risks.

Why this training?
Develop a sharper security intuition with practical exercises and directly applicable knowledge.
Thinking like an attacker
By experimenting with hacking techniques yourself, you will not only learn to recognize vulnerabilities, but also how to effectively prevent them.
Greater effect
We show you how categories of weaknesses work, so you develop intuition. If you see a suspicious code pattern, you immediately recognize the risk.
Practically applicable
You will work hands-on with realistic examples and labs, so that you can immediately apply what you have learned in your own projects.
Training Content
In this training we dive into common vulnerabilities and learn how to recognize, abuse and prevent them.
We cover, among other things:
-
OWASP Top 10
The most critical security risks with real-world examples and prevention strategies.
-
Path Traversal
How attackers gain access to sensitive data through file structures and how to prevent this.
-
Server Side Request Forgery (SSRF)
Manipulating server requests to access internal systems, including mitigation techniques.
-
Command Injection
Executing unauthorized commands on the server and ways to protect your application against it.
-
LLM Injection
How AI-driven systems can be manipulated and what measures you can take to prevent abuse.
After completing this training, you will not only have insight into the origins of these vulnerabilities, but also into ways to structurally prevent them.
What can you expect?
Interactive Workshop
We start with clear explanations and real-world case studies, helping you understand how vulnerabilities arise and how they are exploited. Expect engaging examples from actual penetration tests. Not just theory.
Hands-on Labs
Under the guidance of an ethical hacker, you’ll immediately apply what you’ve learned in practical lab environments. You'll not only see how attacks work but also learn how to effectively defend against them.
Practical, Actionable Techniques
We provide concrete strategies and best practices that you can implement right away in your daily work. Gain insights that strengthen your code’s security without disrupting your workflow.
Room for Questions & Real-World Examples
Have specific security concerns or challenges in your own codebase? This training offers ample opportunity to discuss your own cases and receive direct, expert advice.