Application Security with Snyk

Protect your application from malicious attacks from the start with Snyk a software intelligence product designed to help you find security vulnerabilities in your products.

Security is one of the major pillars of your application, without this pillar, the chances of your application crumbling are high. The reason to focus more on security right from the earliest stages is simple: in order to stay secure, you need to get security right every time. However, attackers on the other hand need to get an attack right only once to succeed.

When you first build your application, you might think security isn't of high importance. "My application's at an infant stage. There's nothing any malicious actors would be interested in. I'll consider security when I scale the application," you might tell yourself.

If you have this thought, you're not the first. But think some more about it. Malicious actors are patient. They could install backdoors in your application or create a zero-day vulnerability when your application lacks security. They could even wait for years and then exploit it when you have a lot to lose. Are you willing to take that risk? Well, you shouldn't.

Security issues in applications happen for two main reasons:

  1. Security loopholes in the logic of the application
  2. Insecure code implementation

Snyk is a security intelligence product that helps you identify and fix vulnerabilities in your application. This course helps you become familiar with Snyk so you can learn to use it to meet your security needs. 

2 days/16 hours of instruction
Public Classroom Pricing


GSA Price: $1485

Group Rate: $1495

Private Group Pricing

Have a group of 5 or more students? Request special pricing for private group training today.

Download the Course Brochure

Part 1: Introduction to Snyk

  1. What is Snyk?
  2. How does Snyk work?
  3. Snyk features
    1. Integrations
    2. Snyk CLI
    3. Snyk API
    4. License compliance management
    5. Snyk intel vulnerability database
    6. Fixing and prioritizing issues
    7. Reporting
  4. Programming languages that Snyk supports
  5. Exercise: Create your Snyk account.
  6. Introduction to Snyk products
    1. Snyk open source
    2. Snyk code
    3. Snyk container
    4. Infrastructure as code
  7. Exercise: Install Snyk CLI using npm, Homebrew, or Scoop.

Part 2: Snyk Open Source

  1. Which source code management systems does Snyk support?
    1. GitHub
    2. Bitbucket
    3. GitLab
    4. Azure Repos
  2. Exercise: Add source control integration. Add your open-source project (Java or JavaScript) to Snyk. Then set regular vulnerability checks (once a week) on your project.
  3. Exercise: Run the first vulnerability check to the previously added project and view the report. Note the number of issues found in the project and the number of highly severe vulnerabilities. Choose one of the highly severe vulnerabilities, and understand the information provided in the summary.
  4. Exercise: Fix all the vulnerabilities with high severity by creating a manual pull/merge request. Once the vulnerability fix is updated on the repo, run the vulnerability check again to verify the fix.
  5. How do automatic pull/merge requests work for the vulnerability fix?
    1. Exercise: Set up automatic pull/merge requests for new vulnerabilities and clear the backlog of vulnerabilities in priority order.
  6. Exercise: Integrate Snyk into your Git-based workflow.

Part 3: Snyk Code

  1. Snyk Code and the developer-first approach
  2. Snyk Code AI engine
  3. Features of Snyk Code:
    1. Accurate code flaw detection
    2. Secret information detection in code
    3. Code flow visualization
    4. Provides information about security issues, their background, and how to approach them
  4. Exercise: Create a simple Java or JavaScript project in JetBrains IDE. Install Snyk's JetBrains IDE plugin. Run an analysis on the code. After the results are generated, filter the results to look for security vulnerabilities in your code.

Part 4: Snyk Container

  1. What security do containers provide?
    1. Decreases attack surface
    2. Isolates applications
    3. Makes security patching easier, with less disruption
  2. Security risks with containers
    1. Privilege escalation
    2. Risk of using insecure images
    3. Kernel or memory threats induced by code
  3. Introducing Snyk container
    1. Snyk container detection: Snyk scans images to find operating system packages, unmanaged software, and application packages based on manifest file
    2. Supported operating systems: Debian, Ubuntu, CentOS, Red Hat Enterprise Linux (including UBI), Amazon Linux 2, SUSE Linux Enterprise Server, Alpine
    3. Recurring scans
  4. Exercise: Add container registry integration to your Snyk account. Add a container project, and view vulnerabilities for the projects.
  5. Exercise: Use Snyk container CLI to test a Docker container image in a Ubuntu machine. Identify the number of vulnerabilities found, and determine how many of these are related to dependencies.
  6. Exercise: Set up Snyk integration to save a snapshot of an image and alert you to new vulnerabilities when they arise.

Part 5: Snyk Infrastructure as Code (IaC)

  1. Exercise: Configure your integration for a Kubernetes environment. Then scan Kubernetes configuration files, and fix the security issues you find.

Part 6: Snyk License Compliance Management and Vulnerability Database

  1. What is Snyk license compliance management?
  2. Exercise: Integrate and add an open-source project to your Snyk. Create a high-severity license policy by adding severity, description, and instructions. Run a scan on the project, and check for license compliance issues.
  3. Access and understand the information in Snyk's intel vulnerability database.

Part 7: Administration

  1. Exercise: Add a user to Snyk, and set up a Single Sign-On (SSO) for the user. Allow the user to add and delete objects, and update a project with a new screenshot. Configure the session length for this user to be two days.
  2. Manage groups and organizations in Snyk: Create groups and switch between groups and organizations.
    1. Exercise: Create two Snyk organizations, and switch between them using the Web UI and CLI.
  3. Exercise: Configure Snyk notifications to send weekly reports only for high-severity vulnerabilities to a newly added user.

  • Cybersecurity Specialists
  • IT Security Specialists
  • Data Security Specialists
  • System Analysts/Admins
  • Developers and Engineers Looking to Specialize in Synk

  • Install Snyk CLI using npm, Homebrew, or Scoop
  • Run the vulnerability checks
  • Fix vulnerabilities with high severity by creating manual pull/merge requests
  • Run analysis on code using Snyk's JetBrains IDE plugin
  • Use Snyk container CLI to test Docker container images 
  • Scan Kubernetes configuration files, and fix the security issues
  • Create a high-severity license policy by adding severity, description, and instructions
  • Configure Snyk notifications to send regular reports 

Application Security with Snyk Schedule


Live Online

Oct 26th - 27th, 2023
10:00 AM - 6:00 PM ET

Live Online

Dec 7th - 8th, 2023
12:00 PM - 8:00 PM ET

Request Private Group Training