21 - 23 June, 2022
ExCeL London

TRAINING COURSES

Thinking about developing and advancing your cybersecurity skills? 

Infosecurity Europe has teamed up with NotSoSecure, experts in penetration testing and cyber security, to provide training sessions taking place on
20-21 June 

Find out more about each session and how to register below.

ApsSec for Developers

20-21 June 2022 - 9am to 5pm (BST)
Early bird until 30th May: £1,750
Standard price from 01st June: £2,000

In this 2-Day Intermediate hands-on course delegates will gain an understanding of application security vulnerabilities including the industry standard OWASP Top 10 list and learn strategies to defend against them.

Pen testing (security testing) as an activity tends to capture security vulnerabilities at the end of the SDLC and then it is often too late to influence fundamental changes in the way the code is written.

Web application security tends to be addressed only when vulnerabilities are found on applications running in production. Addressing these vulnerabilities at that stage becomes an expensive affair. These vulnerabilities arise primarily because developers are not sensitized against their impact and more importantly their fixing/patching.

 

Hacking and Securing Cloud Infrastructure

20-21 June 2022 - 9am to 5pm (BST)
Early bird until 30th May: £1,750
Standard price from 01st June: £2,000

This 2-day course cuts through the mystery of Cloud Services (including AWS, Azure and G-Cloud) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both what makes them different, and what makes them the same, as compared to hacking and securing a traditional network infrastructure.

Whether you are an Architect, Developer, Pentester, Security or DevOps Engineer, or anyone with a need to understand and manage vulnerabilities in a Cloud environment, understanding relevant hacking techniques, and how to protect yourself from them, is critical. This class covers both the theory a well as a number of modern techniques that may be used to compromise various Cloud services and infrastructure.