Bright Solutions Global PLC

      Certified in the Governance of Enterprise IT (CGEIT®)

      Bright Solutions Global PLC
      Inhouse

      £ 201-500
      Prefer to call the centre directly?
      34546... More
      Want to speak to an Advisor about this course?

      Important information

      Typology Short course
      Level Intermediate
      Methodology Inhouse
      Duration 4 Days
      Start Different dates available
      • Short course
      • Intermediate
      • Inhouse
      • Duration:
        4 Days
      • Start:
        Different dates available
      Description

      Protecting applications that are accessible via the Web requires well-prepared security professional who are at all time aware of current attack methods and trends. Plethora of technologies and environments exist that allow comfortable development of Web applications (like Java, ASP.NET or PHP). One should not only be aware of the security issues relevant to these platforms, but also of all general vulnerabilities that apply regardless of the used development tools.
      The course gives an overview of the applicable security solutions in Web applications, focusing on the most important technologies like secure communication and Web services, tackling both transport-layer security and end-to-end security solutions and standards like Web Services Security.

      Facilities (1)
      Where and when
      Starts Location
      Different dates available
      Inhouse
      Starts Different dates available
      Location
      Inhouse

      To take into account

      · What are the objectives of this course?

      Upon completion of this course, you will be able to:* Understand basic concepts of security, IT security and secure coding* Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them* Learn client-side vulnerabilities and secure coding practices* Understand Web services security* Get practical knowledge in using security testing tools* Get sources and further reading on secure coding practices

      · Who is it intended for?

      Web developers, architects, and testers

      · Requirements

      None

      · What marks this course apart?

      The Web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained to avoid the associated problems. Exercises can be easily followed by programmers using different programming languages, thus the Web application-related topics can be easily combined with other secure coding subjects, and can thus effectively satisfy the needs of corporate development groups, who typically deal with various languages and development platforms to develop Web applications.

      Questions & Answers

      Ask a question and other users will answer you

      Achievements for this centre

      2018

      How do you get the CUM LAUDE seal?

      All courses are up to date

      The average rating is higher than 3.7

      More than 50 reviews in the last 12 months

      This centre has featured on Emagister for 1 years

      What you'll learn on the course

      Security
      Governance
      Java
      Web
      IT Security
      Python
      IOS
      IoT
      Embedded programming
      Embedded security

      Teachers and trainers (1)

      Bright Solutions
      Bright Solutions
      Trainer

      Course programme


      #text-block-10 { margin-bottom:0px; text-align:left; }

      IT security and secure coding

      * Nature of security
      * IT security related terms
      * Definition of risk
      * Different aspects of IT security
      * Requirements of different application areas
      * IT security vs. secure coding
      * From vulnerabilities to botnets and cybercrime
      * Classification of security flaws

      Web application vulnerabilities

      * SQL Injection
      * Other injection flaws
      * Cross-Site Scripting (XSS)
      * Broken authentication and session management
      * Cross Site Request Forgery (CSRF)
      * Insecure direct object reference
      * Unvalidated file upload
      * Security misconfiguration
      * Failure to restrict URL access
      * Transport layer security issues
      * Unvalidated redirects and forwards

      #text-block-11 { margin-bottom:0px; text-align:left; }

      Client-side security

      * JavaScript security
      * Ajax security
      * HTML5 Security
      Security of RESTful web services

      * Security of RESTfulweb services
      * REST-related technologies for security
      * REST-related vulnerabilities
      * Improper use of security features
      * Mobile code