Secure Programming: Coming in 2017, 3 days 8:30 am - 4:30 pm): Moscow, Idaho

Secure Programming: Coming in 2017, 3 days 8:30 am - 4:30 pm):  Moscow, Idaho

Location:University of Idaho, Moscow, ID 83854

Pre-register and we will notify you when a date has bee set. Early bird price wlil be $2,100. Regular price: $2,200. Ask about discount rates for groups of 8 or more.

Secure Programming is the “must have” course for all developers. Cybersecurity can no longer be an afterthought but must be integrated into every step of the development process.

Developers will learn how to identify vulnerabilities and code flaws as well as how to correct underlying issues. Each student will take on the role of an attacker and see the security of their environment from the outside. As vulnerabilities and flaws arise, the student moves into demonstrating how the Open Web Application Security Project (OWASP) provides developers with the tools to successfully develop applications that are difficult to hack.

This is a hands-on lab based course that provides skill enhancement through hands-on teaching so knowledge is not just heard but really learned. Developers have a chance to see for themselves how attackers think, how the framework protects the application, as well as where the framework falls short. This course also satisfies section 6.5 of the Payment Card Industry Data Security Standard (PCI DSS).

Course Length 3 Days

Intended Audience This class is focused specifically on software development but is accessible enough for anyone who’s comfortable working with code and has an interest in understanding the developer’s perspective:

Software Developers and Architects Testers/QA specialists Systems and Security Administrators Penetration Testers

Prerequisites Experience with programming in ASP.NET using C# or, Java JSP/Servlets, or PHP (Python available on request), or proficiency and a solid grasp of syntax in whatever platform/language you work with.

Course Objectives

Upon course completion students will:

Understand security concerns, including the PCI DSS

Understand the common vulnerabilities

Understand the underlying code flaws that enable vulnerabilities

Be able to correctly code to avoid flaws

Be able to spot code with potential flaws

Be able to use various tools, libraries, and frameworks to better secure systems and code.

Software Requirements

Please have the following software loaded on your personal laptop to use in the class:

.Net developers will need Visual Studio 2013/2015 Professional or Community. See Microsoft’s site for download and system requirements.

Java developers need Eclipse Luna/Mars and Tomcat 8. See eclipse.organd for system requirements. (other java IDE and web containers may be used).

PHP developers should supply the php environment of their choice. (Not supported by instructor)


Chuck McCullough specializes in software engineering consulting, outsource development, and developer training services. With a quarter century of experience in software development and access to others with similar depth of experience, he can certainly answer your most difficult questions. He has developed dozens of applications over the years in C++, .Net, and Java. He has also trained thousands of developers in these technologies.

Just a few training and/or consulting customers: EDS, IBM, HP/Compaq, Amdocs, Tektronix, Alcatel/DSC, Nortel, Southwest Airlines, American Airlines, Pediatrix, Medical-Edge, Cabela’s, SBC, AT&T, Verizon, Pepsi/Frito Lay, Central Insurance, BNSF, TXU, Samsung, and many more.

Specialties: Software Engineer/Architect, C++, C#, .Net, Java, and corporate training instructor

His philosophy is to be very flexible and provide customers with exactly the service they need. We don’t have canned contracts and models to work from. Rather, we work with our customer to determine what arrangement works best. As an instructor, he always take the “real world” perspective, concentrating on the skills needed to perform tasks on real projects. As an experienced developer, he provides a unique training experience that includes consulting that other dedicated training companies cannot provide.

Offered at a discounted rate through a partnership with IT Training Solutions:

For more information about the Cybersecurity Training and Operations Center, visit

Stock number: