SECURE CODING IN GOLANG TRAINING

🌎 Online

(US-friendly hours)
Course Overview:

Join our focused, interactive 3-hour online course designed for developers who want to enhance their secure coding skills through practical vulnerability analysis and defensive programming techniques in Golang. This training leverages real-world examples and vulnerabilities to teach developers how to write secure code by deeply understanding how and why vulnerabilities occur, as well as how to proactively prevent them through defensive programming.

1 Session

  • June 19, 9AM- 12PM Melbourne, AU (June 18, 4PM- 7PM Pacific Time)
*** Spaces Limited ***
You'll get 1 session of 3-hour training on secure coding in Golang and 3-month access to PentesterLab PRO (valued at US$57.99)
Register:
Credit Card | G Pay Icon | Apple Pay Icon powered by Stripe payment

$250 24 Seats Left!
Key Benefits:
  • Understand common security pitfalls in Golang.
  • Analyze real-world vulnerabilities to improve coding practices.
  • Develop practical skills to proactively secure Golang applications through defensive programming.
Content
  1. Introduction
    • Objectives of the course
    • Importance of secure coding through vulnerability analysis and defensive programming
  2. Golang Security Fundamentals
    • Common pitfalls in Golang web applications
    • Specific vulnerabilities frequently encountered
  3. Defensive Programming Techniques
    • Principles of defensive programming in Golang
    • Implementing robust error handling and input validation
  4. Patterns
    • Bad default
    • Non-Recursive checks
    • Filtering
    • ...
  5. Real-World CVE Analysis
    • Example of Gotchas in Python, Ruby, Golang, ...
    • How to find Gotchas
  6. Vulnerability Analysis Methodology
    • How to effectively analyze vulnerabilities
    • Breaking down vulnerabilities into understandable patterns
  7. Real-World CVE Analysis
    • Examination of selected Golang-specific CVEs
    • Understanding root causes and security implications
    • Practical exercises: analyzing vulnerabilities and proposing defensive fixes
  8. Remediation
    • Fixing bugs
    • Other activities
  9. Conclusion
    • Best practices for continuous improvement in secure coding
    • Final insights and recommendations


(We reserve the right to adjust the course content and organisation based on participant feedback and the dynamics of the class to ensure the best learning experience for everyone.)



Prerequisites:

Participants should have a foundational understanding of common web vulnerabilities, as this knowledge will be essential for fully grasping the security concepts discussed during the course.

Familiarity with basic git commands is also required, as practical exercises will involve using git.



About the instructor:

Louis Nyffenegger is the founder of PentesterLab, a leading educational platform renowned for its comprehensive, hands-on security labs, many of which were personally created by him. Before establishing PentesterLab, Louis honed his expertise in penetration testing across France and Australia. He subsequently specialized in security code reviews at the National Bank of Australia, followed by application security roles at Australia Post and Fitbit, where he regularly performed code reviews. Louis is also a well-regarded speaker, frequently sharing his insights at security conferences such as DEFCON, multiple OWASP events (Auckland, Brisbane, California, Melbourne, ...) and multiple BSides events (Canberra, Perth, Toronto, ...). Additionally, he runs the YouTube channel AppSecSchool, where he shares knowledge and insights on application security.