{"id":20983321,"url":"https://github.com/novatecconsulting/developer-security-training","last_synced_at":"2025-05-14T16:32:21.016Z","repository":{"id":63907900,"uuid":"183211469","full_name":"NovatecConsulting/developer-security-training","owner":"NovatecConsulting","description":"All Labs of the Security for Developers Training","archived":false,"fork":false,"pushed_at":"2023-02-10T14:48:41.000Z","size":9360,"stargazers_count":10,"open_issues_count":2,"forks_count":6,"subscribers_count":5,"default_branch":"master","last_synced_at":"2025-04-02T20:38:38.352Z","etag":null,"topics":["api-gateway","api-security","appsec","challenges","devsecops","encryption","graphql","grpc","hacking","owasp","owasp-juice-shop","rest-api","security","security-flaws","sqlinjection","training-labs","vulnerabilities","vulnerability","xss-injection"],"latest_commit_sha":null,"homepage":"https://www.novatec-gmbh.de/training/security-training-for-developers/","language":"Shell","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/NovatecConsulting.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2019-04-24T11:04:40.000Z","updated_at":"2025-03-27T06:22:48.000Z","dependencies_parsed_at":"2023-02-19T06:30:31.148Z","dependency_job_id":null,"html_url":"https://github.com/NovatecConsulting/developer-security-training","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/NovatecConsulting%2Fdeveloper-security-training","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/NovatecConsulting%2Fdeveloper-security-training/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/NovatecConsulting%2Fdeveloper-security-training/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/NovatecConsulting%2Fdeveloper-security-training/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/NovatecConsulting","download_url":"https://codeload.github.com/NovatecConsulting/developer-security-training/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":254183122,"owners_count":22028425,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["api-gateway","api-security","appsec","challenges","devsecops","encryption","graphql","grpc","hacking","owasp","owasp-juice-shop","rest-api","security","security-flaws","sqlinjection","training-labs","vulnerabilities","vulnerability","xss-injection"],"created_at":"2024-11-19T05:48:31.733Z","updated_at":"2025-05-14T16:32:20.659Z","avatar_url":"https://github.com/NovatecConsulting.png","language":"Shell","readme":"# Security Training for Developers\n\nThis repository contains alls labs and demos that are part of the security training for developers.\n\n** Please note: This is still work in progress **\n\n## Learning targets\n1. Understand basic security terminology\n2. Understand importance of security\n3. OWASP\n   - What is it?\n   - What does OWASP offer? (Projects, Documentation, Tools)\n   - Highlight the most popular and important projects like the OWASP Top 10\n4. Insights on a selected set of static and dynamic application security testing tools\n5. Finding and exploiting vulnerabilities to understand the impact they could cause\n6. Fixing/avoiding specific security issues\n\n## Learning approach\n\n1. Learn about a security issue, threat or vulnerability\n2. How to perform hacking/exploiting the security issue, threat or vulnerability\n3. How to avoid or mitigate such security issue, threat or vulnerability in your own applications and code \n\n### Table of contents\n- [Hacking for Web Application Developers](Hacking-for-Web-Application-Developers/README.md)\n- [Hacking for API Developers](Hacking-for-API-Developers/README.md)   \n- [Cryptography for Developers](Cryptography-for-Developers/README.md)   \n- [Identity Access Management (IAM) for API Developers](Identity-Access-Management-for-Developers/README.md)  \n- [Supply Chain Security](Supply-Chain-Security/README.md)  \n- [Attack Demos](Attack-Demos/README.md)   \n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fnovatecconsulting%2Fdeveloper-security-training","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fnovatecconsulting%2Fdeveloper-security-training","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fnovatecconsulting%2Fdeveloper-security-training/lists"}