| CARVIEW |
- Catalog
- Resources
- Corporate Solutions
- Explore
English
- My LF Profile
- My LF Profile
- My Training Portal
Understanding Vulnerabilities and Security Threats (WSKF603)
- 1-day workshop
- Understand the OWASP® Top 10 Security Threats
- Live demo environment provides hands-on experience in exploiting and defending against vulnerabilities
- Hands-on learning
Securing Coding Fundamentals (WSKF601)
- 3-day workshop
- Empower developers to write and verify secure software themselves
- Learn application security and hacking
- Introduce secure design patterns
- Hands-on learning
Advanced Secure Coding
(Additional Hands-on Labs)
- Expand and customize Secure Coding Fundamentals
- Select one or multiple additional labs, up to 7 for each additional day of training
- All labs include explanation and scenarios of the vulnerability plus hands-on time for exploitation and fixing
See below for additional Workshop information or contact us to learn about pricing and availability.
Understanding Vulnerabilities and Security Threats (WSKF603)
This workshop aims to break down the OWASP® Top 10, helping developers understand the most common pitfalls and misconceptions associated with these risks.
- An in-depth understanding of each item in the OWASP® Top 10
- Hands-on experience in exploiting and defending against each vulnerability
- Insights into the most common mistakes developers make for each risk
- Techniques to battle vulnerabilities
Secure Coding Fundamentals (WSKF601)
Empowering developers to write and verify secure software by design independently, makes this workshop fundamental to security implementation and boosts the security maturity level within the organization. Lecture time is kept to a minimum, as the main focus is hands-on learning.
- Behavior changing, long-lasting security knowledge and skills
- Ability to independently test for web application vulnerabilities
- Skills to perform threat modeling sessions and prevent business logic vulnerabilities
- Understanding of how to fix vulnerabilities and know what secure design patterns to apply
- Knowledge to practice security by design using the Security Knowledge Framework
- Ability to use security automation that adds value in the CI/CD pipeline
Advanced Secure Coding (WSKF602)
Select additional hands-on labs not covered in Secure Coding Fundamentals (WSKF601) to customize your workshop. Each additional 45-minute lab includes explanation and scenarios of the vulnerability plus hands-on time for exploitation and fixing.
- HTTP response splitting
- Host header auth bypass
- Websocket message manipulation
- Web cache poisoning
- Graphql DOS
- GraphQL IDOR
- Authentication bypass
- Command injection
- Insecure deserialization pickle
- Server side request forgery
- Open redirect
- CSS Injection
- Local file inclusion
- Path traversal (LFI)
Bring these valuable workshops to your team!
Contact us to learn about pricing and availability.
Stay Up to Date
Get early access to the latest Linux Foundation Training news, tutorials and exclusive offers – available only for monthly newsletter subscribers.
We won’t ever send you spam, promise.
© 2025 Linux Foundation - Education. The Linux Foundation®. All rights reserved. The Linux Foundation has registered trademarks and uses trademarks. For a list of trademarks of The Linux Foundation, please see our Trademark Usage page. Linux is a registered trademark of Linus Torvalds.
Terms of Use | Privacy Policy | Bylaws | Trademark Usage | Antitrust Policy | Good Standing PolicyAccelerated by 
Sign up to get access to exclusive promotions, the latest trainings and news
Stay up to date with the newest courses, certifications, and promotions from the LF training team.
Thank you for your interest in Linux Foundation training and certification. We think we can better serve you from our China Training site. To access this site please click below.
感谢您对Linux Foundation培训的关注。为了更好地为您服务,我们将您重定向到中国培训网站。 我们期待帮助您实现在中国区内所有类型的开源培训目标。