This hands-on course teaches security professionals, developers, and code reviewers how to manually review source code for the OWASP Top 10 vulnerabilities across multiple programming languages, without relying on automated tools or focusing on frameworks.
Participants will learn to identify insecure coding patterns, trace data flows, and understand common exploitation techniques through real-world code examples. The emphasis is on language-level code analysis, ensuring skills that apply regardless of platform or framework.