Skip to main content Link Search Menu Expand Document (external link)

Secure Coding Practices Workshop

Duration: One Day

Target Audience:

Developers, Software Engineers, and anyone involved in the software development lifecycle.

Workshop Objectives:

  1. Understand the importance of secure coding practices.
  2. Learn about PCI compliance requirements.
  3. Explore the security landscape and challenges.
  4. Identify and mitigate OWASP Top 10 risks.
  5. Integrate secure coding into software design.
  6. Master input validation and output encoding.
  7. Implement effective authentication and authorization.
  8. Ensure data protection and secure communications.

Agenda:

9:00 AM - 9:30 AM: Registration and Welcome

  • Registration, networking, and distribution of workshop materials.

9:30 AM - 10:00 AM: Introduction to Secure Coding

  • Importance of secure coding practices.
  • Overview of common security breaches and their impact.

10:00 AM - 11:00 AM: PCI Compliance

  • Introduction to PCI DSS (Payment Card Industry Data Security Standard).
  • Understanding PCI compliance requirements for secure software development.

11:00 AM - 11:15 AM: Morning Break

11:15 AM - 12:30 PM: OWASP Top 10 Risks and Impacts

  • Overview of OWASP (Open Web Application Security Project).
  • In-depth analysis of current OWASP Top 10 risks and their impacts.
  • Challenges in maintaining security in software development.

12:30 PM - 1:30 PM: Lunch Break

1:30 PM - 2:30 PM: Embedding Secure Coding in Software Design

  • Integrating security into the software development lifecycle.
  • Secure design principles and methodologies.

2:30 PM - 3:30 PM: Input Validation and Output Encoding

  • Best practices for input validation.
  • Implementing output encoding to prevent injection attacks.

3:30 PM - 3:45 PM: Afternoon Break

3:45 PM - 4:15 PM: Authentication and Authorization

  • Ensuring secure user authentication.
  • Implementing robust authorization mechanisms.

4:15 PM - 4:45 PM: Data Protection and Secure Communications

  • Best practices for data protection.
  • Implementing secure communication channels.

4:45 PM - 5:00 PM: Q&A and Closing Remarks

  • Addressing participant questions.
  • Providing additional resources for further learning.

Hands-On Activities:

Throughout the workshop, participants will engage in hands-on coding exercises and case studies. This includes:

  • Implementing secure authentication mechanisms.
  • Identifying and mitigating OWASP risks through sample application development.
  • Writing secure code snippets for common programming languages like Java, JavaScript/Typescript.

Workshop Materials:

  • Presentation slides.
  • Code samples for hands-on activities.
  • Reference materials on secure coding practices.

This workshop is designed to be interactive and hands-on, allowing participants to gain practical experience in implementing secure coding practices.