Secure Credential Handling

Insecure handling of credentials is a common vulnerability. This training shows modern approaches for secure authentication and credential management.

  • Modern authentication methods and their security aspects
  • Using credentials securely without hardcoding
  • Practical secrets‑management approaches for all environments
Secure Credential Handling

Best Practices for Handling Credentials

Insecure management of credentials is one of the most common causes of security incidents in modern applications. From weak passwords and unprotected API keys to hardcoded secrets — the attack surface is large.

Fortunately, there are proven practices and modern tools that enable secure handling of credentials. From WebAuthn and passkeys for users to TLS-based authentication for services — without complex OAuth flows or risky DIY JWT implementations.

This training provides hands-on approaches for secure credential management across all environments and shows how to handle and monitor authentication errors safely when they occur.

What you'll learn

  • Sign-in methods: from passwords and WebAuthn/passkeys to API authentication
  • Why JWTs can be problematic and which alternatives make sense
  • TLS-based authentication for standard services like MySQL and Redis
  • Credential rotation, revocation, and certificate management
  • Secure usage: environment variables, container secrets, and secrets managers
  • Managing credentials consistently from dev to production
  • Error handling and monitoring without logging sensitive data
  • Least privilege and other authorization concepts

Who should attend?

This training is aimed at developers, DevOps engineers, and security owners who want to implement secure authentication in their applications and manage credentials professionally.

Prerequisites

We recommend basic knowledge of web development and working with APIs.

Experience with authentication methods and container technologies is helpful but not required.

What you'll gain from this training

  • You'll know the different authentication methods and how to evaluate their suitability
  • You'll understand the security aspects of various sign-in approaches
  • You'll be able to establish credential-management processes in your organization
  • You'll get hands-on experience with different approaches to secret management

Secure your seat

Register now — or book a free consultation to tailor the training.

Secure Credential Handling 🇬🇧

Duration: 8 hours

May 27, 2026 10:00am-12:00pm and 10:00am-12:00pm (CEST)02:00pm-04:00pm (CEST)02:00pm-04:00pm (CEST)

799 €
Book for 799 €

Secure Credential Handling 🇬🇧 🇩🇪

Duration: ca. 8 hours

Your preferred date, any number of participants. Either in Zoom or using your preferred video conferencing software.

from 3600 €
Your desired date online (Zoom) Arne Blankerts
Start free consultation on online training →

Secure Credential Handling 🇬🇧 🇩🇪

Duration: 2-3 days

Your preferred date, any number of participants. At your company or at your desired location.

from 5500 €
Your desired date Any location Arne Blankerts
Start free consultation on inhouse training →
Credits allow discounted access to our training courses. Learn More
Easy access to all our training courses for a monthly fixed fee. Learn More

Frequently Asked Questions

Why are there no full-day online courses?
Our content is designed for optimal online learning: Short, focused sessions promote concentration and provide time to process what has been learned between units.
Are the training sessions live or recorded?
All our training courses take place live as a video conference and are led by an experienced trainer. Participants can ask questions at any time.
What makes your training courses unique?
Our training courses combine hands-on tasks with live coding and solving real-life problems. Our experienced trainers guarantee a particularly good learning experience.
Are your training courses remote or in-person?
We offer our training courses both remotely and in person in order to meet the different requirements of our customers.
Can you tailor training courses specifically to our needs?
Naturally. We can customise our training courses to the individual needs of teams and their technology stacks at any time.
What advantages do individualised training courses offer?
In-house training courses allow you to arrange individual topics, flexible dates and guarantee targeted learning in a familiar environment. This is usually financially viable for four or more participants.
Is there a certification?
Yes, participants will receive a certificate on request after successful participation.