DKB STIFTUNG

Secure Coding Practices

Starting with specific security challenges including common vulnerabilities such as SQL injection, remote code execution, deserialization attacks, and insecure configurations, you will learn how to identify and mitigate risks in applications.

Sven Ruppert

The linked survey is voluntary and anonymous. You can use the form multiple times and rate the sessions you attended individually.

Feedback