top of page

Application Security Training

August 3rd-7th, 2020

Amsterdam, nld

Register Now
Hotel Information

Coyote Coding is coming up with a training program in Amsterdam NLD, specially crafted for IT professionals to secure their applications. This program is designed for developers, defenders, and security consultants to equip them with all the latest advancements in Web Application Security Testing.

More and more web applications delegate business logic to the client., JavaScript, SVG, Canvas, ES2017 & AngularJS are just some terms that describe the contents of the modern web stack. But how does the attack surface look for those? What if there is no GET parameter and our scanner scans cannot tampers with them? Classic web-pen tests are “so nineties” in this realm. And keeping up the pace with progress is getting harder and harder. But there is hope. We’ll learn how to attack any web-application with either unknown legacy features – or the half-baked results coming to your browser from the labs of W3C, WHATWG and the ES2016 mailing lists. Whether you want to attack modern web applications or shiny browser extensions – we have that covered. HTML is a living standard. And so is this workshop. The course material will be provided on-site and via access to a private Github repository so all attendees will be receive updated material even months after the actual training.


The training session will present you an opportunity to have hands-on experience with countless tricks and techniques of exploiting the (seemingly) unexploitable! We will cover a great range of modern website bugs and teach you how to make sure that these issues get fixed properly and smoothly.


Security Consultants

Security Consultants will get hands on experience on latest techniques and methodologies to exploit any web-application with unknown legacy features or the half-baked results coming to your browser.


Developers will gain knowledge and understanding of the concepts, standards and precautionary measures for developing a highly secure web application.


The top management will be able to understand the risks in Business continuity with a vulnerable application in order to take well informed decisions".

bottom of page