From £3,085 + VAT
- SFIA
Skills Framework for the Information Age (SFIA) identifies and describes over 100 skills and 7 levels of job roles. To find out more, read What is SFIA?
To book this course, call us on 0113 382 6296 or get in touch via the form.
Overview
The future of secure software development depends on developers who understand how to design, build, and maintain secure applications. This intensive two-day course provides developers, architects, and tech leads with practical skills to identify and remediate vulnerabilities in their code. Through interactive labs and real-world scenarios, learners will explore modern application security practices and learn to apply threat modelling techniques using the STRIDE methodology. Participants will also gain insight into secure coding patterns, defensive programming, and common exploitation techniques used by attackers.
The course bridges theory with hands-on practice to help developers strengthen their security mindset, align development workflows with security principles, and confidently safeguard applications throughout their lifecycle.
Objectives
Participants should have:
- A working understanding of application development in any modern programming language.
- Basic familiarity with software development lifecycles and version control systems.
- Awareness of common web technologies such as HTTP, APIs, and client–server communication.
Target audience
This course is designed for:
- Software developers at junior, mid, or senior levels.
- Technical leads and software architects responsible for secure design.
- Development teams seeking to embed security within their software lifecycle.
The course is particularly relevant for teams that manage both legacy and modern applications, and who want to integrate secure practices into their Agile or DevOps workflows.
Learning Outcomes
By the end of this course, learners will be able to:
- Understand key principles of application security and their relevance to the software lifecycle.
- Apply the STRIDE threat modelling methodology to assess risks at any stage of development.
- Identify, exploit, and remediate vulnerabilities in application code through hands-on exercises.
- Secure data in transit and at rest using appropriate cryptographic methods.
- Implement safe authentication, session management, and API security controls.
- Recognise and defend against client-side, server-side, and injection-based attacks.
- Integrate secure coding and vulnerability management practices into Agile development environments.
- Build a culture of security awareness across the development team.
Course Outline
Application security fundamentals
- Why secure development is essential in modern software environments.
- The cost of insecure code and lessons from real-world breaches.
- Understanding the OWASP Top 10 and common developer pitfalls.
- Core threat modelling concepts and the STRIDE framework.
Developer environment security
- Protecting code in repositories and managing secure commits.
- Securing third-party dependencies and libraries.
- Automated code scanning and continuous integration security.
- Simulated attacks: phishing and supply chain compromises.
Front-end security
- Understanding the HTTP/HTTPS protocol and browser request flows.
- Identifying attack surfaces in client-side code.
- Securing forms, input validation, and browser sessions.
- Applying and testing client-side security headers.
- Attacks and mitigations:
- Cross-site scripting (XSS)
- File upload vulnerabilities and client-side code injection
- Session hijacking and cookie manipulation
Backend and API security
- Securing authentication and authorisation mechanisms.
- Applying secure design principles to APIs and backend logic.
- ORM and model-layer security to prevent injection and mass assignment.
- Integration security for third-party APIs and external services.
- Attacks and mitigations:
- Brute force and login bypass
- Parameter tampering
- Server-side URL manipulation
Data security
- Principles of protecting data at rest and in transit.
- Implementing encryption, hashing, and key management securely.
- Understanding cryptographic vulnerabilities.
- Attacks and mitigations:
- SQL injection
- Insecure deserialisation
Secure file handling
- Validating file uploads and managing MIME types.
- Safely processing and storing user-uploaded documents.
- Attacks and mitigations:
- Remote code execution via malicious uploads
- XML external entity (XXE) attacks
- Insecure direct object reference (IDOR)
Source code review and exploit chaining
- Conducting secure source code reviews.
- Analysing vulnerable code snippets to identify exploit chains.
- Capture the flag exercise: identifying flaws under timed conditions.
Threat modelling and agile security integration
- Applying threat modelling to full applications and incremental features.
- Building and maintaining threat lists within Agile workflows.
- Integrating security requirements into backlogs and sprints.
- Driving a team-wide security culture through process and awareness.
Exams and assessments
There are no formal exams in this course. Instead, learners complete interactive labs, practical challenges, and a competitive capture the flag activity to test their skills. Knowledge checks and guided discussions ensure participants can apply their learning to real-world projects.
Hands-on learning
This course includes extensive hands-on activities, including:
- Practical threat modelling of real application features.
- Exploiting and remediating more than ten common vulnerabilities using professional security tools.
- Reviewing and securing insecure code in sandboxed environments.
- Simulated red-team exercises led by experienced penetration testers.
- A final capture the flag challenge to reinforce and test learning outcomes.
QA is proud to be an official partner with NotSoSecure.

NSS Technical Paper - Defending against Client-Side Attacks
Why choose QA
- Award-winning training, top NPS scores
- Over 500,000 learners in 2024
- Our training experts are industry leaders
- Read more about QA
Related courses
Cyber Security learning paths
Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.
Software learning paths
Want to boost your career in software engineering? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.
Secure Engineering learning paths
Want to boost your career in Secure Engineering? View QA's learning pathway below, specially designed to give you the skills to succeed.
Frequently asked questions
How can I create an account on myQA.com?
There are a number of ways to create an account. If you are a self-funder, simply select the "Create account" option on the login page.
If you have been booked onto a course by your company, you will receive a confirmation email. From this email, select "Sign into myQA" and you will be taken to the "Create account" page. Complete all of the details and select "Create account".
If you have the booking number you can also go here and select the "I have a booking number" option. Enter the booking reference and your surname. If the details match, you will be taken to the "Create account" page from where you can enter your details and confirm your account.
Find more answers to frequently asked questions in our FAQs: Bookings & Cancellations page.
How do QA’s virtual classroom courses work?
Our virtual classroom courses allow you to access award-winning classroom training, without leaving your home or office. Our learning professionals are specially trained on how to interact with remote attendees and our remote labs ensure all participants can take part in hands-on exercises wherever they are.
We use the WebEx video conferencing platform by Cisco. Before you book, check that you meet the WebEx system requirements and run a test meeting to ensure the software is compatible with your firewall settings. If it doesn’t work, try adjusting your settings or contact your IT department about permitting the website.
How do QA’s online courses work?
QA online courses, also commonly known as distance learning courses or elearning courses, take the form of interactive software designed for individual learning, but you will also have access to full support from our subject-matter experts for the duration of your course.
Once you have purchased the Online course and have completed your registration, you will receive the necessary details to enable you to immediately access it through our e-learning platform and you can start to learn straight away, from any compatible device. Access to the online learning platform is valid for one year from the booking date.
All courses are built around case studies and presented in an engaging format, which includes storytelling elements, video, audio and humour. Every case study is supported by sample documents and a collection of Knowledge Nuggets that provide more in-depth detail on the wider processes.
When will I receive my joining instructions?
Joining instructions for QA courses are sent two weeks prior to the course start date, or immediately if the booking is confirmed within this timeframe. For course bookings made via QA but delivered by a third-party supplier, joining instructions are sent to attendees prior to the training course, but timescales vary depending on each supplier’s terms. Read more FAQs.
When will I receive my certificate?
Certificates of Achievement are issued at the end the course, either as a hard copy or via email. Read more here.
Let's talk
A member of the team will contact you within 4 working hours after submitting the form.