Updated: 14 June 2022
tl;dr
I am delivering training courses on how to build effective processes around application security scanning tools as part of my work for Bounce Security. The course’s official name is “Building a High-Value AppSec Scanning Programme” and it’s unofficial, more fun but less descriptive name is “Tune your Toolbox for Velocity and Value”. This post will serve as a way of getting more information about the course.
The easiest way to attend this course right now is to sign-up for the one day version focusing on SCA and SAST tools at Virtual Global AppSecEU which you can do at the registration page here. This has now passed but you can see the feedback from the courses here.
We don’t currently have any public dates lined up (although watch this space đ) but you are welcome to get in touch with me to discuss private training by Bounce Security via email (info <at> bouncesecurity.com) or via Twitter.
Index of information
- Text about the course
- Audio/Visual information about the course
- How can I attend this training course?
Text about the course
Background
You bought the application security tools, you have the findings, but now what? Many organisations find themselves drowning in âpossible vulnerabilitiesâ, struggling to streamline their processes and not sure how to measure their progress.
If you are involved in using SAST, DAST or SCA tools in your organisation, these may be familiar feelings to you and this course comes to try and address these issues
This is a topic I have had significant experience with over the last several years providing application security consulting and âon the groundâ assistance to various organisations. This has exposed me to a variety of these tools and several ways of working with them, seeing what works and what does not in different contexts.
Being a consultant means I have no vendor allegiance or commitment and allows me to discuss useful war stories (both successful and less successful) without disclosing sensitive client/employer information.
From seeing these organisations and discussing in various forums, this problem certainly seems to resonate and training like this would fill a gap that urgently needs to be addressed. Companies are being told that they need to improve their application security posture and that more tools are the key to doing this efficiently. However, it is becoming clear that without effective processes and strategies for working with these tools, they quickly become a burden and a blocker.
Content summary
In this course you will learn how to address these problems and more (in a vendor-neutral way), with topics including:
- What to expect from these tools?
- Customising and optimising these tools effectively
- Building tool processes which fit your business
- Automating workflows using CI/CD without slowing it down.
- Showing the value and improvements you are making
- Faster and easier triage through smart filtering
- How to focus on fixing what matters and cut down noise
- Techniques for various alternative forms of remediation
- Building similar processes for penetration testing activities.
- Comparison of the different tool types covered.
To bring the course to life and let you apply what you learn, you will work in teams on table-top exercises where you design processes to cover specific scenarios, explain and justify your decisions to simulated stakeholders and practice prioritising your remediation efforts.
For these exercises, you will work based on specially designed process templates (which we will provide) which you can use afterwards to apply these improvements within your own organisation.
Be ready to work in a group, take part in discussions and present your findings and leave the course with clear strategies and ideas on how to get less stress and more value from these tools.
Feedback so far
We ran a 1 day version of the course focussing on SCA and SAST virtually at OWASP Global AppSec EU 2022 and it went great. Feedback included everyone feeling they had achieved their desired learning outcomes, 100% satisfaction with the instructor (me đĽ°) and 100% Net Promoter ScoreÂŽ. There was also significant positive feedback on the hands-on exercises.
Attendee comments included:
“On target good advice on taking the next steps in SCA and SAST.“
“For me it was the perfect input to structure the ideas we already have in our sast introduction journey.“
We are excited to expand with more content and broader exercises in upcoming longer versions!
Audio/Visual information about the course
For those of you who prefer to hear their information rather than read it, here are some useful resources.
Elevator pitch for the course ~2 minutes
In this short video, I give a quick explanation of the course and the ideas around it. Transcript in the original LinkedIn post.
Discussion of the background to the course – ~40 minutes
In this interview with the Application Security Podcast, I talk through the background to the course including where the idea came from and the key takeaways and ideas I want people to get from the course.
Sample of the course material ~ 55 mins
This is an example of some of the course content albeit pushed together in a less interactive way. The course itself has more discussion and exercises interspersed.
How can I attend this training course?
Manicode Training
I am honoured to be listed in the legendary Jim Manico’s training catalogue. Jim’s catalogue is primarily aimed at organisations arranging training for their employees and has a variety of top-class taught training courses. I strongly recommend that anyone looking for the best application and cloud security training takes a close look at what is on offer.
The full training catalogue can be found on the Manicode website and the extracts for my Tools course are below. (I also have an ASVS course available which you can see in the catalogue as well đ!)
To find out more and how to arrange, you can get in touch with Jim via the Manicode website or get in touch with us directly via info <at> bouncesecurity.com.


Other venues
To be confirmed but stay tuned!