Practical training for secure-by-design software development
From $1,800 per person (ex GST)
Discount pricing for students. Please see the terms of booking below!
In just two days, you’ll gain the foundational skills every software and security engineer needs to create secure, resilient applications and the confidence to apply them immediately.
Through a mix of hands-on practical exercises, engaging group activities, and real-world case studies, you’ll learn how to spot security flaws in your code, choose the right DevSecOps capabilities for your stack, and apply secure-by-design principles from day one.
We don’t stop at technical know-how. You’ll also master the program management skills that make security stick, including getting stakeholder buy-in, running impactful training programs, and measuring success to drive lasting change.
And when you graduate? You’ll join The Flock, our alumni network of the most skilled product security professionals in Asia Pacific.
Course Outline
Theory
Practical Exercises
Theory
Practical Exercises
Theory
Practical Exercises
The Foundations of Application Security course is available at:
To qualify for the student discount, you’ll need to provide proof of current student status and a short video testimonial after completing the course.
All prices are in AUD.
Jon-Anthoney de Boer
Product Security Lead
Transmax
Jonathan Milgate
Chief Technology Officer
Camplify
Amazing! High-quality delivery of brilliant content. I loved the adaptable style that was tailored to my team’s needs in real time.
Leander Nott
Software Development Manager
Allambi Care
Foundations of Application Security reinforced my AppSec knowledge, and the practical exercises were fun and valuable. I appreciated the instructor’s balance of engagement and expertise, and I’m looking forward to future courses with Cole.
Nina Juliadotter
Application Security Practice Lead
Westpac Group
Meet your Instructor
Founder & CEO Galah Cyber
Cole Cornford is a recognised leader in Australia’s application security scene. As Founder of Galah Cyber, he’s led major security programs across global teams and brings a strong engineering mindset to everything he does.
An active OWASP contributor, sought-after speaker, and host of the Secured podcast, Cole is known for cutting through complexity and speaking the language of developers.
This course is best suited for mid-level software engineers, security engineers, and professionals in related disciplines such as DevOps, IT, Cloud, Infrastructure, and Data. Managers with a technical background will also benefit from the practical, hands-on learning.
It is not recommended for non-technical or executive-level staff.
Engineers in startups or scaleups will find this training especially valuable, as it equips you to build security capability in-house without relying on external consultants or dedicated security hires.
This course requires students to have;
Students without a software engineering background may struggle to comprehend many of the technical concepts being taught and find the hands-on exercises difficult and frustrating. Students without formal computer science education will be able to follow, but may need to take note of unfamiliar concepts to research at a later time or during breaks.
Students will need;
The course is designed explicitly for in-person instruction, and remote attendees may struggle to participate in practical exercises or otherwise feel excluded.
Developers, DevOps Engineers, Infrastructure Engineers, Software Engineers, Product Security, Application Security, Penetration Testers, Security Consultants, QA Engineers, and technical leadership (Head of X / CTO / CISO / CIO).
Yes. Secure coding principles map to OWASP Top 10 as well as OWASP ASVS. The AppSec Governance content maps to OWASP SAMM. OpenSSF’s SLSA and VEX / CVSS / KEV are referenced throughout the course as well.
Yes. The course has a mix of practical technical activities performed on your personal devices such as reviewing source code for issues as well as running application security tools. These are balanced with group activities for threat modelling and classroom discussions and debates around provided case studies.
Public courses do not offer remote attendance. Private courses can cater for some remote attendance but are designed for in-person cohorts. Remote participants may have a degraded experience for group activities, discussions, and practical exercises.
A public course must have at least six enrolments to run. If your location does not get the minimum number of enrolments we can offer to transfer your enrolment to a different city, or provide you with a refund.
Yes. We cap the attendance at twenty (20) students. Further enrolments will degrade the experience as our instructors will not be able to give enough attention to each student and classroom activities do not scale well beyond this amount.
Contact us at course@galahcyber.com.au. If a cohort of at least six enrolled students is available in your location, we can arrange for an instructor to run the course from that location at a later date. Alternatively, you may attend courses at other locations.
Yes. Contact us at course@galahcyber.com.au with any questions that you may have about the course. We can introduce prior students or managers to discuss their experiences with you.
Yes. The certification will be made available in January 2026 and will cover broad technical and non-technical application security concepts, largely covered in the course.
Yes. The course will require students to review a custom-built software application through static and dynamic techniques, as well as run application security products. Students who are unable to bring a device may find the first day highly theoretical or may need to share with another student to learn.
Devices should be able to run docker, python, shell/cmd, view pdf files, and view source code in an IDE.
No. This course assumes that students only have access to free or open-source appsec products. Many students do not have the budget or exposure to enterprise appsec tooling, and we believe good appsec practices can be implemented independently of product choices. While we cover a variety of product categories, we aim to remain agnostic towards or against any specific product or business.
No. Each company has a unique technology stack. Because of this, we aim to teach principles and practices that can be applied agnostically. Our custom-built software application is written in Typescript with Express + NodeJS as the backend. React is the frontend language. We use Docker for distribution. C# and Laravel versions of this have been requested previously. With enough interest we can port to these technologies in the future.
Yes. If you cannot attend the course, we are happy to give you a placement at a different location or subsequent running of the course in the second semester. We offer refunds in full up until four weeks before the course running date as at that time we would have paid for venue, travel, and delivery expenses.
Yes, but generally for private course offerings. Private courses that are run at customer premises, or that are in excess of 20 students will have discounting applied. Contact us at course@galahcyber.com.au to discuss your options.