Secure Coding Courses

At Secure Coding Academy we have a dream, a vision of a safe and secure IT world,
where all software engineers will know how to write secure code.

back

Get your quotation

back

Educational Program

Get in touch today so we can tell you why companies around the world trust us to
educate their entire pool of software professionals

Tailored Content Onsite Delivery Everywhere

I liked the course content, the level of expertise and the dedication of the trainer.

January 2017, Rabat, Morocco

The trainer was really professional and the VM was awesome!

February 2017, Budapest, Hungary

Demo applications and case studies were very useful. Java and other framework bugs were collected well.

February 2017, Budapest, Hungary

The course came with a wide range of topics, I also enjoyed the examples which I could try out myself

February 2017, Budapest, Hungary

Exercises, good atmosphere, ideal VM for exercises.

March 2017, Szeged, Hungary

I liked the fun parts and the relevancy!

March 2017, Oslo, Norway

I enjoyed the injections overview and it's hands on. They've given a clear way for having checks, validations and planning for code vulnerabilities on a daily basis.

March 2017, Campinas, Brazil

I really loved the study cases and the perfectly prepared environment for the exercises.

March 2017, Campinas, Brazil

The foundation topics about security, the several examples, exercises and case studies presented and I liked especially the desktop applications exploiting part.

March 2017, Campinas, Brazil

I liked the examples that showed how easy it was to exploit a small bug.

April 2017, Halmstad, Sweden

View All Reviews

The cheapest and the most effective way
to do software security is through training

It's Your choice

Your programmers work hard each day...

...to produce vulnerable code


Resulting in hundreds of security bugs yearly...

...to test

...to find

...and to correct

Our research lab can help in this case too
Or you can

Send them to one of our secure coding training

And they start...

...to write secure code

from their next working day

Start training

Secure coding courses

The entire security development life cycle (SDLC) covered

All languages

C/C++ .NET Java PHP

All platforms

Windows Linux Android IOS
Browse all courses Or see how we bring secure coding trainings to you

Scademy is your
global training provider

Get practical secure coding skillS that you
can apply on your next working day

Be up-to-date on latest attack methods
and mitigation techniques

Hands-on-exercises that come with
real-life hacking fun

On-site training
and educational programs

Ask for an in-house training

Individual enrollment
to an open session

Register to a training event

On-line introduction
to secure coding

Join our free webinar

Training partners

Become our partner

In the news

Publications based on the security advisories of our
Search-lab security evaluation analysis and research laboratory

Hungarian lab adds storage to D-Link SOHOpeless list

Hungarian lab adds storage to D-Link SOHOpeless list

Tests at the Hungarian Search-Lab on DNS-320, DNS-320L, DNS-327L and DNR-326 units using 30-07-2014-dated firmware yielded more than 50 vulnerabilities, including authentication bypasses and something the lab says looks like a backdoor.

Read more on
search-lab.hu
Flaw in Android Backup System Enables Injection of Malicious Apps

Flaw in Android Backup System Enables Injection of Malicious Apps

A security bug in a backup mechanism of the Android operating system can be exploited to install malicious apps on vulnerable devices, researchers have warned.

Read more on
search-lab.hu
Vulnerabilities discovered in the Android Open Source Project by SEARCH-LAB

Vulnerabilities discovered in the Android Open Source Project by SEARCH-LAB

SEARCH-LAB discovered several vulnerabilities in the Android Open Source Project end of last summer. They were responsible disclosed to the Android security team and now that the fixes are deployed, will be revelead for the public.

Read more on
search-lab.hu
OpenSSL DTLS infinite recursion stack overflow (CVE-2014-0221)

OpenSSL DTLS infinite recursion stack overflow (CVE-2014-0221)

OpenSSL version 1.0.1g and earlier - as well as all software that integrates these versions of OpenSSL - are vulnerable to stack overflow caused by infinite recursion in the code establishing DTLS client connection, allowing remote attackers to perform denial of service. The vulnerable code is located before the SSL handshake takes place, but it might be triggered after the handshake as well. This vulnerability was discovered and researched Imre Rad from SEARCH-LAB Ltd.

Read more on
search-lab.hu
Security vulnerability in LG’s Update Center application

Security vulnerability in LG’s Update Center application

SEARCH-LAB Ltd discovered another security issue threatening LG Smart Phone users: malicious attackers controlling the network are able to install arbitrary applications on victim handsets.

Read more on
search-lab.hu
37 million digitally signed documents had to be reverified

37 million digitally signed documents had to be reverified

In November 2014, SEARCH-LAB Ltd. discovered a security vulnerability in multiple computer applications that are used to generate and validate digital signatures, which are applied within the official Hungarian government processes. The vulnerability affected the „e-akta” signed document file format, where a file with a valid digital signature could be manipulated in a way that the verification software indicated a valid signature while it displayed a different document than the original.

Read more on
search-lab.hu
Serious security vulnerability discovered in LG Smart Phones by SEARCH-LAB

Serious security vulnerability discovered in LG Smart Phones by SEARCH-LAB

A malicious attacker is able to bypass the authentication phase of the network communication, and thus establish a connection to the On Screen Phone application without the owner’s knowledge or consent. Once connected, the attacker could have full control over the phone – even without physical access to it. The attacker needs only access to the same local network as the phone is connected to, for example via Wi-Fi.

Read more on
search-lab.hu
Load more news...

Founders

Zoltán Hornák

Zoltán Hornák

Dealt with various fields of IT security from his early years, from bit-level analysis of computer viruses up to the security organizational issues of multinational companies. Spent eight years as development director in the anti-virus industry, more than a decade in security research at the Budapest University and Technolgy, and founded several startups in the security domain, including SCADEMY Secure Coding Academy.

Ernő Jeges

Ernő Jeges

Programmer for 30 years, working in software security for 15 years now. Led many R&D projects and published scientific publications on various security topics. He has actively taken part in the elaboration of all course materials, and is a highly qualified trainer with a decade of teaching and security experience; already held numerous secure coding courses in various topics for leading software developing companies all over the world. Co-founder, managing director and lead trainer of SCADEMY Secure Coding Academy.

Kristóf Kerényi

Kristóf Kerényi

During his studies at the Budapest University of Technology, he spent several semesters in Germany and the USA, completing his MSc degree in 2002, followed by an MBA in 2009. Started working in R&D in the field of IT security just after graduation, and has become an expert in embedded systems security. One of the leading trainers of SCADEMY Secure Coding Academy.

Join our globally growing team

Become our trainer

Contact Us

Please give us some more details