<span class="font-bold">Level up your training</span> <br /> with limited-time offers

Level up your training
with limited-time offers

12

Days

:

14

Hours

:

53

Minutes

:

22

Seconds

8-bit video game blocks with pixel art of the Learn One and Learn Enterprise logos

Level up your training with limited-time offers - Discounts for Individuals and Enterprise

Strengthen your development process with enhanced security protocols

OffSec Learning Path: Intermediate Secure Software Development II

Tackle sophisticated attacks and elevate secure coding skills. Dive into advanced exploit mitigation strategies, configuration hardening, and vulnerability analysis to protect web applications with greater depth. This path builds upon earlier OffSec learnings. Learners will:

  • Master robust defenses against complex attack vectors

  • Optimize system and app configurations for heightened security

  • Develop the ability to assess, identify, and remediate deep-rooted vulnerabilities

Hero image for Strengthen your development process with enhanced security protocols

One of five secure software development Learning Paths

Advance your secure development expertise

This Learning Path builds upon fundamental secure coding knowledge for sophisticated threat protection. Fortify your skillset with cross-origin attack countermeasures, advanced debugging, and insight into cutting-edge vulnerability exploitation trends.

Who is this Learning Path for?

  • Developers seeking to specialize in application security
  • Security teams aiming to address nuanced software weaknesses
  • Ambitious learners ready to expand their skillset beyond foundational practices

Learning objectives

  • Deeply understand cross-origin vulnerabilities and secure configurations
  • Proactively address template and SQL injection tactics
  • Implement proactive hardening against credential-based attacks.
  • Develop a tactical grasp of insecure deserialization risks and prevention.

Key modules in the Intermediate Secure Software Development II Learning Path

Cross-Origin Attacks for Developers

  • This module covers how cross origin requests work in modern web applications, what attacks can occur due to misconfigurations, and what security controls need to be implemented to safely allow cross-origin requests.

Content Security Policy

  • Introduction to Content Security Policy and what vulnerabilities it can protect against. We will cover several important CSP directives, as well as how to design and audit CSP settings.

Password Reset Vulnerabilities for Developers

  • We will cover several vulnerabilities for password reset features and and how to mitigate them

Limitations of Web Application Firewalls

  • This module provides an overview of web application firewalls. It also provides a hands-on example of creating a virtual patch and how attackers might bypass WAF rules.

Cross-site Scripting for Developers

  • This Learning Module focuses Cross-Site Scripting, primarily on the client-side using HTML and JavaScript. The content also covers some basic server-side PHP code vulnerable to stored XSS. The content includes vulnerable code examples and several mitigation strategies.

Template Injection for Developers

  • This module covers template injection attacks and how developers can prevent them.

Insecure Deserialization for Developers

  • Understanding how deserialization can introduce vulnerabilities in web applications, including the examination of vulnerable code samples. We will also cover several techniques for preventing or remediating insecure deserialization.

Intermediate Secure Software Development II overview

11

modules

55

hours of content (approx.)

15+

skills

Intermediate SecureDevelopment

Earning an OffSec Learning Badge

Showcase commitment to building secure applications! Upon completing 80% of the Intermediate Secure Software Development II Learning Path, you'll receive an exclusive OffSec badge. This badge:

  • Proves knowledge: Demonstrates proficiency in core secure coding concepts and vulnerability assessment.
  • Boosts credibility: Add an OffSec achievement to a learners skillset, whether you're an individual or promoting your team's capabilities.
  • Unlocks further learning: Motivates continued growth in the Secure Software Development learning path series.

 Why have your team learn secure software development with OffSec?

Specialized expertise

Acquire skills to address diverse, highly targeted attacks.

Robust protection

Strengthen web configurations and optimize mitigation practices.

Stay ahead of trends

Understand dynamic threat landscapes to maintain secure application environments.

Start learning with OffSec

Intro
content

Learn
Fundamentals

$799/year*

Access to all fundamental content for one year to prepare for our advanced courses.

Buy now
All
access

Learn
Unlimited

$5,799/year*

Unlimited OffSec Learning Library access plus unlimited exam attempts for one year.

undefined
Large teams

Learn
Enterprise

Get a quote

Flexible terms and volume discounts available.

Contact us
*Subscription auto-renews unless canceled.

FAQ

Syllabus

  1. Cross-Origin Attacks for Developers
  2. Cross-site Scripting for Developers
  3. Content Security Policy
  4. Template Injection for Developers
  5. SQL Injection for Developers
  6. Server-side Request Forgery for Developers
  7. Security Misconfigurations
  8. Credential Attacks for Developers
  9. Password Reset Vulnerabilities for Developers
  10. Insecure Deserialization for Developers
  11. Limitations of Web Application Firewalls

What prerequisites are necessary for this Learning Path?

What skills will I gain?

Will this path address trending threats in the industry?

How is this training different from other secure coding options?


Start your journey today

Individual

Individual

Ideal for

One learner

Buy now

Team

Team

Ideal for

Fewer than 10 learners

Buy now

Have questions? Contact sales

Organization

Organization

Ideal for

10 or more learners

Contact sales
Graduation cap icon colored in with a gradient fading from purple to teal

New to cybersecurity want to get educated on fundamental content before signing up?

Check out Cyberversity - our free resource library covering essential cybersecurity topics.

Learn more