Secure Coding Courses

At Secure Coding Academy we have a dream, a vision of a safe and secure IT world,
where all software engineers will know how to write secure code.

back

Get your quotation

back

Educational Program

Get in touch today so we can tell you why companies around the world trust us to
educate their entire pool of software professionals

Tailored Content Onsite Delivery Everywhere

Well-structured theory, material of high standard, lots of exercises help imprinting the learnt issues.

January 2016, Budapest, Hungary

Well comprehensible, easy to follow; it is obvious that there is a need for continuous learning in this domain.

January 2016, Budapest, Hungary

I learned a lot of new things about threats and risks for which my application should be prepared for.

February 2016, Stuttgart, Germany

Lots of new information, especially about the still relevant dangers of buffer overflows. Thanks for that! :)

February 2016, Stuttgart, Germany

Good pace, trainer did very well at maintaining clear focus and participation.

March 2016, München, Germany

The relation to current topics as well as the expertise of the trainer made the whole training very motivating.

March 2016, München, Germany

The trainer is good! One can feel his affinity to security.

March 2016, München, Germany

I liked the case studies, as well as the discussions about crypto.

March 2016, Minneapolis, MN, USA

A wealth of information that truly allowed me to better understand the security concerns in our code.

March 2016, Minneapolis, MN, USA

Very thorough examples, lots of information to back up why certain protocols and practices exist.

March 2016, Minneapolis, MN, USA

View All Reviews

The cheapest and the most effective way
to do software security is through training

It's Your choice

Your programmers work hard each day...

...to produce vulnerable code


Resulting in hundreds of security bugs yearly...

...to test

...to find

...and to correct

Our research lab can help in this case too
Or you can

Send them to one of our secure coding training

And they start...

...to write secure code

from their next working day

Start training

Secure coding courses

The entire security development life cycle (SDLC) covered

All languages

C/C++ .NET Java PHP

All platforms

Windows Linux Android IOS
Browse all courses Or see how we bring secure coding trainings to you

Scademy is your
global training provider

Get practical secure coding skillS that you
can apply on your next working day

Be up-to-date on latest attack methods
and mitigation techniques

Hands-on-exercises that come with
real-life hacking fun

On-site training
and educational programs

Ask for an in-house training

Individual enrollment
to an open session

Register to a training event

On-line introduction
to secure coding

Join our free webinar

Training partners

Become our partner

In the news

Publications based on the security advisories of our
Search-lab security evaluation analysis and research laboratory

Hungarian lab adds storage to D-Link SOHOpeless list

Hungarian lab adds storage to D-Link SOHOpeless list

Tests at the Hungarian Search-Lab on DNS-320, DNS-320L, DNS-327L and DNR-326 units using 30-07-2014-dated firmware yielded more than 50 vulnerabilities, including authentication bypasses and something the lab says looks like a backdoor.

Read more on
search-lab.hu
Flaw in Android Backup System Enables Injection of Malicious Apps

Flaw in Android Backup System Enables Injection of Malicious Apps

A security bug in a backup mechanism of the Android operating system can be exploited to install malicious apps on vulnerable devices, researchers have warned.

Read more on
search-lab.hu
Vulnerabilities discovered in the Android Open Source Project by SEARCH-LAB

Vulnerabilities discovered in the Android Open Source Project by SEARCH-LAB

SEARCH-LAB discovered several vulnerabilities in the Android Open Source Project end of last summer. They were responsible disclosed to the Android security team and now that the fixes are deployed, will be revelead for the public.

Read more on
search-lab.hu
OpenSSL DTLS infinite recursion stack overflow (CVE-2014-0221)

OpenSSL DTLS infinite recursion stack overflow (CVE-2014-0221)

OpenSSL version 1.0.1g and earlier - as well as all software that integrates these versions of OpenSSL - are vulnerable to stack overflow caused by infinite recursion in the code establishing DTLS client connection, allowing remote attackers to perform denial of service. The vulnerable code is located before the SSL handshake takes place, but it might be triggered after the handshake as well. This vulnerability was discovered and researched Imre Rad from SEARCH-LAB Ltd.

Read more on
search-lab.hu
Security vulnerability in LG’s Update Center application

Security vulnerability in LG’s Update Center application

SEARCH-LAB Ltd discovered another security issue threatening LG Smart Phone users: malicious attackers controlling the network are able to install arbitrary applications on victim handsets.

Read more on
search-lab.hu
37 million digitally signed documents had to be reverified

37 million digitally signed documents had to be reverified

In November 2014, SEARCH-LAB Ltd. discovered a security vulnerability in multiple computer applications that are used to generate and validate digital signatures, which are applied within the official Hungarian government processes. The vulnerability affected the „e-akta” signed document file format, where a file with a valid digital signature could be manipulated in a way that the verification software indicated a valid signature while it displayed a different document than the original.

Read more on
search-lab.hu
Serious security vulnerability discovered in LG Smart Phones by SEARCH-LAB

Serious security vulnerability discovered in LG Smart Phones by SEARCH-LAB

A malicious attacker is able to bypass the authentication phase of the network communication, and thus establish a connection to the On Screen Phone application without the owner’s knowledge or consent. Once connected, the attacker could have full control over the phone – even without physical access to it. The attacker needs only access to the same local network as the phone is connected to, for example via Wi-Fi.

Read more on
search-lab.hu
Load more news...

Founders

Zoltán Hornák

Zoltán Hornák

Dealt with various fields of IT security from his early years, from bit-level analysis of computer viruses up to the security organizational issues of multinational companies. Spent eight years as development director in the anti-virus industry, more than a decade in security research at the Budapest University and Technolgy, and founded several startups in the security domain, including SCADEMY Secure Coding Academy.

Ernő Jeges

Ernő Jeges

Programmer for 30 years, working in software security for 15 years now. Led many R&D projects and published scientific publications on various security topics. He has actively taken part in the elaboration of all course materials, and is a highly qualified trainer with a decade of teaching and security experience; already held numerous secure coding courses in various topics for leading software developing companies all over the world. Co-founder, managing director and lead trainer of SCADEMY Secure Coding Academy.

Kristóf Kerényi

Kristóf Kerényi

During his studies at the Budapest University of Technology, he spent several semesters in Germany and the USA, completing his MSc degree in 2002, followed by an MBA in 2009. Started working in R&D in the field of IT security just after graduation, and has become an expert in embedded systems security. One of the leading trainers of SCADEMY Secure Coding Academy.

Join our globally growing team

Become our trainer

Contact Us

Please give us some more details