What is the Cost?
Request a quote
Unlike traditional classroom or video-based training, Codebashing is a hands-on, interactive solution that fits into developers’ daily routines. Rather than spending a whole day learning about security vulnerabilities out-of-context, developers receive bite-size, on-demand sessions that are relative to the specific challenges they are facing in their code.
Checkmarx offers a unique integration between its Static Application Security Testing solution and secure coding education solution. Vulnerabilities identified by static analysis are linked to practical training lessons, providing quick and pointed remediation guidance. This teaches the developer why the problem happened, how to fix it, and, more importantly, how to prevent making the same mistake again.
Codebashing allows security teams to raise the AppSec knowledge baseline across the entire development team in a fast, scalable, and positive manner. The philosophy behind the solution is to empower developers long-term, by teaching them how to think and act with a secure mindset, rather than how to solve specific issues. Managers have full control and visibility – they can easily assign specific programming languages courses to their teams and continuously track their progress.
With Codebashing, security teams can keep developers up to date on general AppSec news, organization-wide security announcements, and specific Codebashing activities. Examples include, a weekly security best practice tip, a monthly training reminder, a quarterly security challenge and an annual company secure development guideline.
Codebashing is compatible with regulatory standards such as the PCI-DSS that requires either “role based security training” or more specifically “developer security training”.
Use of Insufficiently Random Values
Persistent (Stored) XSS
Directory (Path) Traversal
Privileged Interface Exposure
Leftover Debug Code
Authentication Credentials In URL
Session Exposure within URL
Horizontal Privilege Escalation
Vertical Privilege Escalation
Cross Site Request Forgery (POST)
Cross Site Request Forget (GET)
Insecure URL Redirect
Insecure TLS Validation
Insecure Object Deserialization
Components with Known Vulnerabilities
Due to our numerous partnerships, we can provide unbiased opinions on the best solution for your environment.
Our partnership levels give us the highest product discounts which we pass on as savings to our customers.
Finish your IT projects on-time and under budget with our nation-wide team of senior level engineers.
Rest assured knowing that our U.S. based IT support team is here for you on nights, weekends and when you need us most.