Secure development: from hackers to developers is a one-day in-depth course using the CTF-like platform OWASP Dojo, which helps developers gain a deeper understanding of how hackers break their code. The course focuses on best practices in secure development to raise awareness of development vulnerabilities which may result in potential security gaps.
€399 + VAT
4 hours of classroom training + 4 hours of practical work
KPMG Estonia training rooms, Ahtri 4, Tallinn
Maximum number of participants is up to 15 participants
The training course and study materials are in English.
Secure development: from hackers to developers is a one-day in-depth course using the CTF-like platform OWASP Dojo, which helps developers gain a deeper understanding of how hackers break their code. The course focuses on best practices in secure development to raise awareness of development vulnerabilities which may result in potential security gaps.
Course materials will be distributed to participants. At the end of the course, participants will receive a course completion certificate signed by KPMG.
During the course, participants will need to use their own laptop (with VPN capability). Please contact us if you do not have a suitable computer for the course.
Required prior knowledge: understanding technical text in English to use the materials.
The training will take place in the training rooms of KPMG Baltics OÜ at the Forum business centre in Tallinn (Narva mnt 5).
Instructions (room number, floor, parking, etc.) will be provided after registration.
In the event of COVID-19 related restrictions, the course will take place online / in the form of a hybrid course or on other dates.
Rajith joined KPMG in 2020. Before that, Rajith worked as an information security engineer at TechCERT. He has been certified as Secure Software Development Lifecycle Professional (CSSLP), and he is also OCI Certified Associate.
Senior Penetration Tester
Provide a safe and sustainable business environment for your company. We help build a resilient and reliable digital landscape, even in the face of changing threats.
Analysis of employee awareness focuses on mapping the skills and increasing the competencies of the weakest link in cyber security: the users, the employees.
Threat assessment is a tactical and technical service that allows a company to get a quick overview of external threats.
Maturity assessment helps plan IT investments and design further steps to mitigate vulnerabilities and ensure better security.