Public Sector

We've had the pleasure of working with UK and overseas central and local government departments, including Healthcare (NHS and Foundation Trusts), Defence, Education (Universities and colleges), many of the main Civil Service departments, Emergency Services; also public-owned corporations including the BBC, Bank of England, Ordnance Survey, and regulatory bodies such as Ofgem.

We are registered on Crown Commercial Service’s (CCS) Dynamic Purchasing System (RM6219 Training and Learning) and also with numerous tender portals such as Ariba, Coupa and Delta E-Sourcing.

Read more...

Graduate Training Schemes

Framework Training has a strong track record of providing a solid introduction into the working world for technical graduates across myriad industries. We provide the opportunity to learn and gain valuable hands-on experience in a supportive, friendly and sociable training environment.

Attract & retain the brightest new starters

We know it is vital for our clients to invest in the future of their talented grads; not only to provide them with high-quality, professional training essential for their roles, but to embed them within the organisation’s culture and guide them on the right path to a successful career.

After all, your new hires could well be the next leaders and their creative ideas and unique insights are invaluable to your business.

Read more ...

Learning & Development

Our unique portfolio of high-quality technical courses and training programmes are industry-respected. They’re carefully designed so that delegates can seamlessly apply what they’ve learnt back in the workplace. Our team of domain experts, trainers, and support teams know our field — and all things tech — inside out, and we work hard to keep ourselves up to speed with the latest innovations. 

We’re proud to develop and deliver innovative learning solutions that actually work and make a tangible difference to your people and your business, driving through positive lasting change. Our training courses and programmes are human-centred. Everything we do is underpinned by our commitment to continuous improvement and learning and generally making things much better.

Read more...

Corporate & Volume Pricing

Whether you are looking to book multiple places on public scheduled courses (attended remotely or in our training centres in London) or planning private courses for a team within your organisation, we will be happy to discuss preferential pricing which maximise your staff education budget.

Enquire today about:

  • Training programme pricing models  

  • Multi-course voucher schemes

Read more...

Custom Learning Paths

We understand that your team training needs don't always fit into a "one size fits all" mould, and we're very happy to explore ways in which we can tailor a bespoke learning path to fit your learning needs.

Find out about how we can customise everything from short overviews, intensive workshops, and wider training programmes that give you coverage of the most relevant topics based on what your staff need to excel in their roles.

Read more...

Building Secure Node.js Applications

Implement practical security techniques and tools for Node.js Developers.

About the course

Node.js has become a hugely popular platform for building web applications, APIs, and microservices due to its speed and efficiency. However, the connected nature of Node.js applications also exposes them to a wide range of web security threats. Developing secure Node.js code requires a solid understanding of common vulnerabilities and how to prevent them effectively using secure coding practices and the features available within the Node.js ecosystem and related frameworks. This 2-day intensive hands-on training course is specifically designed for Node.js developers who want to build secure applications and protect them against prevalent web vulnerabilities. The course focuses on understanding key web security concepts, relevant resources, and dives into practical techniques for preventing specific security breaches in Node.js applications, all reinforced through hands-on exercises and simulations.

The course begins with an introduction to application security specifically in the context of Node.js development. Participants will explore the critical importance of integrating security early and throughout the development lifecycle, become familiar with common web security jargon, and learn about key organisations and resources such as OWASP, MITRE, and Snyk that provide valuable guidance and tools for Node.js security. The training then delves into specific, critical security areas essential for Node.js web applications. This includes understanding and implementing secure Headers and Content Security Policy (CSP) to protect against client-side attacks, understanding and securely configuring Cross-Origin Resource Sharing (CORS) to manage interactions between different origins, and identifying and defending against dangerous Command Injection Vulnerabilities that can arise in Node.js when executing external commands.

A core component of this course is its strong emphasis on practical application. Participants will engage in hands-on exercises throughout the training to solidify their understanding and build practical mitigation skills. The course also covers examining CVE Reports relevant to Node.js and performing Vulnerability Analysis, including setting up test environments and walking through practical demonstrations of exploiting and mitigating vulnerabilities. Participants will explore developing a Security Mental Model tailored for Node.js development and learn ongoing strategies for maintaining application security post-deployment, including best practices for regular security audits and updates. The training is highly interactive, featuring practical coding sessions, simulations of real-world security scenarios in Node.js, and group discussions and analysis of famous security breaches to provide valuable real-world context. The course concludes with a recap of key learnings, focusing on applying security knowledge effectively in real-world Node.js environments and understanding the crucial business impacts of insecure software.

Instructor-led online and in-house face-to-face options are available - as part of a wider customised training programme, or as a standalone workshop, on-site at your offices or at one of many flexible meeting spaces in the UK and around the World.

    • Understand the importance of application security, common web security jargon, and the unique security considerations in the context of Node.js.
    • Identify and utilise key organisations (OWASP, MITRE, Snyk) and resources for enhancing Node.js application security.
    • Implement secure Headers and effectively configure Content Security Policy (CSP) in Node.js applications.
    • Understand the risks associated with Cross-Origin Resource Sharing (CORS) and securely configure CORS in Node.js applications.
    • Identify and implement effective defences against Command Injection Vulnerabilities in Node.js applications.
    • Examine security reports, perform basic vulnerability analysis, and replicate/mitigate vulnerabilities relevant to Node.js through practical exercises.
    • Develop a security-focused mindset and understand ongoing strategies for ensuring the security of Node.js applications through audits and updates.
    • Apply learned security concepts through practical coding sessions, simulations, and analysis of real-world scenarios in a Node.js environment.
    • Understand the business impacts of insecure software and the value of secure development.
  • This 2-day intensive hands-on training course is designed for software developers building applications using Node.js who want to improve their security knowledge and practices. It is ideal for:

    • Node.js Developers who want to write secure code and protect their applications against common web vulnerabilities.

    • Node.js Architects and Technical Leads responsible for designing secure Node.js application architectures and guiding development teams.

    • Anyone involved in building or maintaining web applications or APIs using Node.js frameworks (e.g., Express.js, Koa.js).

    • Developers interested in understanding web security principles specifically in the context of Node.js development.

  • Participants should have:

    • Experience developing applications using Node.js and JavaScript.

    • Familiarity with building web applications or APIs using Node.js frameworks (e.g., Express.js, Koa.js) is helpful.

    • A basic understanding of web technologies (HTTP, browsers, client-server concepts).

    We can customise the training to match your team's experience and needs - with more time and coverage of fundamentals for newer developers, for instance.

  • This Node.js security course is available for private / custom delivery for your team - as an in-house face-to-face workshop at your location of choice, or as online instructor-led training via MS Teams (or your own preferred platform).

    Get in touch to find out how we can deliver tailored training which focuses on your project requirements and learning goals.

  • Introduction to Application Security in Node.js

    • Understanding OWASP in the context of Node.js and web security.

    • Importance of Application Security in Node.js: The "Why".

    • Common jargon in web security and their implications in Node.js development.

    • Practical Session/Discussion: Exploring security concepts with Node.js examples.

    Exploring Key Organisations and Resources

    • Overview of significant organisations in the web security domain (OWASP, MITRE, Snyk) and their relevance.

    • Utilizing resources for Node.js application security (Documentation, Cheat Sheets, Tools).

    • Discussion: Exploring useful online resources.

    Headers and Content Security Policy (CSP)

    • Implementing secure headers in Node.js applications (e.g., using Helmet.js middleware).

    • Understanding and configuring Content Security Policy (CSP).

    • Strategies to prevent common security breaches via headers (e.g., XSS, clickjacking).

    • Hands-On Lab: Implementing and configuring secure headers and CSP in a sample Node.js application.

    Cross-Origin Resource Sharing (CORS)

    • Understanding CORS in the context of Node.js applications (Same-Origin Policy bypass).

    • Risks of insecure CORS configurations.

    • Best practices for configuring CORS securely in Node.js (e.g., using the cors package).

    • Hands-on exercises to implement and test secure CORS configurations.

    Command Injection Vulnerabilities

    • Identifying command injection vulnerabilities in Node.js (e.g., using child_process unsafely).

    • Understanding the impact of command injection.

    • Best practices to defend against command injection in Node.js.

    • Hands-on exercises to understand and prevent these vulnerabilities.

    CVE Reports and Vulnerability Analysis

    • Examining CVE reports relevant to Node.js packages and runtime.

    • Setting up test environments to replicate vulnerabilities (overview).

    • Practical demonstrations of exploiting and mitigating vulnerabilities discussed (using vulnerable Node.js examples).

    • Discussion/Analysis: Analysing a real-world Node.js CVE report.

    Security Mental Models and Strategies

    • Developing a security-focused mindset for Node.js development (Thinking like an attacker).

    • Ongoing strategies to ensure application security (Dependency management, patching).

    • Best practices for regular security audits and updates for Node.js projects.

    • Discussion: Strategies for integrating security into daily development workflow.

    Summary and Conclusion

    • Recap of key learnings from the course.

    • Applying security knowledge in real-world Node.js environments.

    • Understanding the business impacts of insecure software and the value of investing in secure development.

    • Group Discussion: Analysis of famous security breaches and lessons learned.

    Throughout we’ll have:

    • Practical sessions to apply learned concepts through coding exercises.

    • Simulations of real-world security scenarios in Node.js.

    • Group discussions and analysis of famous security breaches.

Trusted by

BBC logo University of Oxford logo / crest IBM company logo

Public Courses Dates and Rates

Please get in touch for pricing and availability.

Related courses