We may earn an affiliate commission when you visit our partners.
CodeMash

CodeMash 2020 | Capture That Flag : How CTF Competitions Make You a Better Developer | John Koerner

Read more

CodeMash 2020 | Capture That Flag : How CTF Competitions Make You a Better Developer | John Koerner

Have you ever been asked to "think like a hacker?" Do your eyes glaze over when you have to sit through a security audit of your application? Do you want to avoid having an incident? If any of these apply to you, consider participating in a Capture the Flag (CTF) competition. In this conference talk, John Koerner will explore the basic concepts of a CTF, a bevy of tools that are available to you, and dig into some example flags that have relevance to you as a developer. John will also cover topics such as buffer overflows, SQL injection, and cross site scripting, just to name a few. You'll walk away with the skills needed to participate in your first (or your next) CTF competition and with the knowledge of how this will make your applications more secure.

Enroll now

What's inside

Syllabus

Capture That Flag : How CTF Competitions Make You a Better Developer

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops skills and knowledge necessary to participate in Capture the Flag competitions
Examines topics such as buffer overflows, SQL injection, and cross site scripting, which are highly relevant to application security
Taught by John Koerner, who is recognized for their expertise in application security
May be more suitable for learners with some prior knowledge or interest in application security

Save this course

Save How CTF Competitions Make You a Better Developer: CodeMash to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for How CTF Competitions Make You a Better Developer: CodeMash. These are activities you can do either before, during, or after a course.

Career center

Learners who complete How CTF Competitions Make You a Better Developer: CodeMash will develop knowledge and skills that may be useful to these careers:
Security Researcher
A Security Researcher is responsible for conducting research to identify new security vulnerabilities and develop defensive measures. This course on Capture the Flag (CTF) competitions provides Security Researchers with a deep understanding of security concepts and practical experience in applying them to cutting-edge research. Through hands-on challenges, participants learn about advanced attack techniques, emerging threats, and innovative defensive strategies, enabling them to contribute to the advancement of cybersecurity knowledge and practices.
Information Security Analyst
An Information Security Analyst is responsible for protecting an organization's information systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course on Capture the Flag (CTF) competitions provides Information Security Analysts with hands-on experience in identifying and mitigating security vulnerabilities. Through the exploration of CTF challenges, participants develop practical skills in areas such as penetration testing, vulnerability assessment, and incident response, which are essential for success in this role.
Penetration Tester
A Penetration Tester is responsible for conducting authorized security assessments to identify vulnerabilities in an organization's systems and networks. This course on Capture the Flag (CTF) competitions provides Penetration Testers with a comprehensive understanding of penetration testing techniques and practical experience in applying them. Through hands-on challenges, participants develop skills in vulnerability discovery, exploitation, and reporting, enabling them to effectively identify and mitigate security risks.
Threat Intelligence Analyst
A Threat Intelligence Analyst is responsible for collecting, analyzing, and disseminating threat intelligence to inform security decision-making. This course on Capture the Flag (CTF) competitions provides Threat Intelligence Analysts with a deep understanding of threat intelligence principles and practical experience in applying them. Through hands-on challenges, participants learn about threat identification, analysis, and reporting techniques, enabling them to effectively contribute to an organization's security posture.
Cyber Threat Analyst
A Cyber Threat Analyst is responsible for analyzing cyber threats and providing recommendations to mitigate risks. This course on Capture the Flag (CTF) competitions provides Cyber Threat Analysts with a comprehensive understanding of cyber threat analysis techniques and practical experience in applying them. Through hands-on challenges, participants learn about threat intelligence gathering, analysis, and reporting, enabling them to effectively identify and prioritize cyber threats.
Security Engineer
A Security Engineer designs, implements, and maintains security measures to protect an organization's information systems and networks. This course on Capture the Flag (CTF) competitions provides Security Engineers with a deep understanding of security concepts and practical experience in applying them. Through hands-on challenges, participants learn about various attack vectors and defensive techniques, enabling them to make informed decisions and develop effective security solutions.
Incident Responder
An Incident Responder is responsible for responding to and handling security incidents. This course on Capture the Flag (CTF) competitions provides Incident Responders with a thorough understanding of incident response procedures and practical experience in applying them. Through hands-on challenges, participants learn about incident detection, triage, containment, and remediation techniques, enabling them to effectively manage and resolve security incidents.
Application Security Engineer
An Application Security Engineer is responsible for designing, implementing, and maintaining security measures for software applications. This course on Capture the Flag (CTF) competitions provides Application Security Engineers with a deep understanding of application security concepts and practical experience in identifying and mitigating vulnerabilities. Through hands-on challenges, participants learn about common application security threats, secure coding practices, and testing and analysis techniques, enabling them to develop and maintain secure applications.
Cloud Security Engineer
A Cloud Security Engineer is responsible for designing, implementing, and maintaining security measures for cloud computing environments. This course on Capture the Flag (CTF) competitions provides Cloud Security Engineers with a deep understanding of cloud security principles and practical experience in applying them to real-world scenarios. Through hands-on challenges, participants learn about cloud security architecture, threat detection techniques, and incident response procedures, enabling them to effectively secure cloud environments.
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for monitoring and analyzing an organization's security systems and networks to identify and respond to potential threats. This course on Capture the Flag (CTF) competitions provides Cybersecurity Analysts with the skills and knowledge necessary to stay ahead of evolving cyber threats. By learning about CTF challenges, participants develop expertise in detecting and mitigating vulnerabilities, conducting threat assessments, and responding to security incidents.
Network Security Engineer
A Network Security Engineer is responsible for designing, implementing, and maintaining an organization's network security infrastructure. This course on Capture the Flag (CTF) competitions provides Network Security Engineers with a thorough understanding of network security principles and practical experience in applying them. Through hands-on challenges, participants learn about network vulnerabilities, threat detection techniques, and defensive measures, enabling them to build and maintain secure networks.
Forensic Analyst
A Forensic Analyst is responsible for investigating and analyzing digital evidence to support legal proceedings. This course on Capture the Flag (CTF) competitions provides Forensic Analysts with a strong foundation in digital forensics concepts and practical experience in applying them. Through hands-on challenges, participants learn about evidence collection, analysis, and reporting techniques, enabling them to effectively conduct digital investigations.
Blockchain Developer
A Blockchain Developer is responsible for designing, developing, and maintaining blockchain-based systems and applications. This course on Capture the Flag (CTF) competitions provides Blockchain Developers with a strong foundation in blockchain security concepts and practical experience in identifying and mitigating vulnerabilities in blockchain systems. Through hands-on challenges, participants learn about common blockchain security threats, secure coding practices, and testing and analysis techniques, enabling them to build and maintain secure blockchain applications.
Software Developer
A Software Developer is responsible for designing, implementing, and maintaining software systems and applications. This course on Capture the Flag (CTF) competitions provides Software Developers with valuable skills and knowledge to improve their abilities in these areas. By exploring fundamental CTF concepts, tools, and example flags related to security vulnerabilities such as buffer overflows, SQL injection, and cross-site scripting, Software Developers can enhance their understanding of potential security threats and develop more secure applications.
Cybersecurity Consultant
A Cybersecurity Consultant provides expert advice and guidance on cybersecurity matters to organizations. This course on Capture the Flag (CTF) competitions may be helpful for Cybersecurity Consultants as it provides a deep understanding of cybersecurity principles and practical experience in identifying and mitigating vulnerabilities. By learning about CTF challenges, participants can enhance their ability to assess an organization's security posture, identify potential risks, and develop effective security strategies.

Reading list

We haven't picked any books for this reading list yet.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser