Overview

The future of secure software development depends on developers who understand how to design, build, and maintain secure applications. This intensive two-day course provides developers, architects, and tech leads with practical skills to identify and remediate vulnerabilities in their code. Through interactive labs and real-world scenarios, learners will explore modern application security practices and learn to apply threat modelling techniques using the STRIDE methodology. Participants will also gain insight into secure coding patterns, defensive programming, and common exploitation techniques used by attackers.

The course bridges theory with hands-on practice to help developers strengthen their security mindset, align development workflows with security principles, and confidently safeguard applications throughout their lifecycle.

Read more +

Objectives

Participants should have:

  • A working understanding of application development in any modern programming language.
  • Basic familiarity with software development lifecycles and version control systems.
  • Awareness of common web technologies such as HTTP, APIs, and client–server communication.

Target audience

This course is designed for:

  • Software developers at junior, mid, or senior levels.
  • Technical leads and software architects responsible for secure design.
  • Development teams seeking to embed security within their software lifecycle.

The course is particularly relevant for teams that manage both legacy and modern applications, and who want to integrate secure practices into their Agile or DevOps workflows.

Read more +

Learning Outcomes

By the end of this course, learners will be able to:

  • Understand key principles of application security and their relevance to the software lifecycle.
  • Apply the STRIDE threat modelling methodology to assess risks at any stage of development.
  • Identify, exploit, and remediate vulnerabilities in application code through hands-on exercises.
  • Secure data in transit and at rest using appropriate cryptographic methods.
  • Implement safe authentication, session management, and API security controls.
  • Recognise and defend against client-side, server-side, and injection-based attacks.
  • Integrate secure coding and vulnerability management practices into Agile development environments.
  • Build a culture of security awareness across the development team.
Read more +

Course Outline

Application security fundamentals

  • Why secure development is essential in modern software environments.
  • The cost of insecure code and lessons from real-world breaches.
  • Understanding the OWASP Top 10 and common developer pitfalls.
  • Core threat modelling concepts and the STRIDE framework.

Developer environment security

  • Protecting code in repositories and managing secure commits.
  • Securing third-party dependencies and libraries.
  • Automated code scanning and continuous integration security.
  • Simulated attacks: phishing and supply chain compromises.

Front-end security

  • Understanding the HTTP/HTTPS protocol and browser request flows.
  • Identifying attack surfaces in client-side code.
  • Securing forms, input validation, and browser sessions.
  • Applying and testing client-side security headers.
  • Attacks and mitigations:
    • Cross-site scripting (XSS)
    • File upload vulnerabilities and client-side code injection
    • Session hijacking and cookie manipulation

Backend and API security

  • Securing authentication and authorisation mechanisms.
  • Applying secure design principles to APIs and backend logic.
  • ORM and model-layer security to prevent injection and mass assignment.
  • Integration security for third-party APIs and external services.
  • Attacks and mitigations:
    • Brute force and login bypass
    • Parameter tampering
    • Server-side URL manipulation

Data security

  • Principles of protecting data at rest and in transit.
  • Implementing encryption, hashing, and key management securely.
  • Understanding cryptographic vulnerabilities.
  • Attacks and mitigations:
    • SQL injection
    • Insecure deserialisation

Secure file handling

  • Validating file uploads and managing MIME types.
  • Safely processing and storing user-uploaded documents.
  • Attacks and mitigations:
    • Remote code execution via malicious uploads
    • XML external entity (XXE) attacks
    • Insecure direct object reference (IDOR)

Source code review and exploit chaining

  • Conducting secure source code reviews.
  • Analysing vulnerable code snippets to identify exploit chains.
  • Capture the flag exercise: identifying flaws under timed conditions.

Threat modelling and agile security integration

  • Applying threat modelling to full applications and incremental features.
  • Building and maintaining threat lists within Agile workflows.
  • Integrating security requirements into backlogs and sprints.
  • Driving a team-wide security culture through process and awareness.

Exams and assessments

There are no formal exams in this course. Instead, learners complete interactive labs, practical challenges, and a competitive capture the flag activity to test their skills. Knowledge checks and guided discussions ensure participants can apply their learning to real-world projects.

Hands-on learning

This course includes extensive hands-on activities, including:

  • Practical threat modelling of real application features.
  • Exploiting and remediating more than ten common vulnerabilities using professional security tools.
  • Reviewing and securing insecure code in sandboxed environments.
  • Simulated red-team exercises led by experienced penetration testers.
  • A final capture the flag challenge to reinforce and test learning outcomes.

Read more +

QA is proud to be an official partner with NotSoSecure.

NSS Technical Paper - Defending against Client-Side Attacks

Download Technical Paper

Why choose QA

Dates & Locations

Cyber Security learning paths

Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.

= Required
= Certification
AI Governance
AI Security
Application Security
Cyber Blue Team
Cybersecurity Maturity Model Certification (CMMC)
Cloud Security
Continuity & Resilience
DFIR Digital Forensics & Incident Response
Industrial Controls & OT Security
Information Security Management
NIST Pathway
Offensive Security
Privacy Professional
Reverse Engineer
Secure Coding
Security Auditor
Security Architect
Security Risk
Security Tech Generalist
Vulnerability Assessment & Penetration Testing

Software learning paths

Want to boost your career in software engineering? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.

= Required
= Certification
Front End Developer
Back End Developer Java
Back End Developer .NET
Cloud Developer AWS
Cloud Developer Azure
Application Security
Secure Coding
Back End Developer Average salary: £81,000
Back End Developer Average salary: £81,000

Secure Engineering learning paths

Want to boost your career in Secure Engineering? View QA's learning pathway below, specially designed to give you the skills to succeed.

= Required
= Certification
Application Security
Secure Coding
Security Architect
Need to know

Frequently asked questions

How can I create an account on myQA.com?

There are a number of ways to create an account. If you are a self-funder, simply select the "Create account" option on the login page.

If you have been booked onto a course by your company, you will receive a confirmation email. From this email, select "Sign into myQA" and you will be taken to the "Create account" page. Complete all of the details and select "Create account".

If you have the booking number you can also go here and select the "I have a booking number" option. Enter the booking reference and your surname. If the details match, you will be taken to the "Create account" page from where you can enter your details and confirm your account.

Find more answers to frequently asked questions in our FAQs: Bookings & Cancellations page.

How do QA’s virtual classroom courses work?

Our virtual classroom courses allow you to access award-winning classroom training, without leaving your home or office. Our learning professionals are specially trained on how to interact with remote attendees and our remote labs ensure all participants can take part in hands-on exercises wherever they are.

We use the WebEx video conferencing platform by Cisco. Before you book, check that you meet the WebEx system requirements and run a test meeting to ensure the software is compatible with your firewall settings. If it doesn’t work, try adjusting your settings or contact your IT department about permitting the website.

How do QA’s online courses work?

QA online courses, also commonly known as distance learning courses or elearning courses, take the form of interactive software designed for individual learning, but you will also have access to full support from our subject-matter experts for the duration of your course.

Once you have purchased the Online course and have completed your registration, you will receive the necessary details to enable you to immediately access it through our e-learning platform and you can start to learn straight away, from any compatible device. Access to the online learning platform is valid for one year from the booking date.

All courses are built around case studies and presented in an engaging format, which includes storytelling elements, video, audio and humour. Every case study is supported by sample documents and a collection of Knowledge Nuggets that provide more in-depth detail on the wider processes.

When will I receive my joining instructions?

Joining instructions for QA courses are sent two weeks prior to the course start date, or immediately if the booking is confirmed within this timeframe. For course bookings made via QA but delivered by a third-party supplier, joining instructions are sent to attendees prior to the training course, but timescales vary depending on each supplier’s terms. Read more FAQs.

When will I receive my certificate?

Certificates of Achievement are issued at the end the course, either as a hard copy or via email. Read more here.

Let's talk

A member of the team will contact you within 4 working hours after submitting the form.

By submitting this form, you agree to QA processing your data in accordance with our Privacy Policy and Terms & Conditions. You can unsubscribe at any time by clicking the link in our emails or contacting us directly.