Secure Programming of Web Applications - Developers and TPMs

Course

Online

£ 10 + VAT

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Understand Application Security: Numerous successful attacks on well-known web applications on a weekly basis should be reason enough to study the background of "Web Application Security" of custom-made or self-developed applications.Intro
Typical Vulnerabilities Overview
Cause & Background
Secure Programming in general
Code/Command Injection in general
(No)SQL Code Injection
Cross-Site Request Forgery (CSRF)
Cross-Site Scripting (XSS)
Open Redirection
File Inclusion / Directory Traversal
Clickjacking
Session-Hijacking
Information Disclosure

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Security of Web Applications
Secure Programming Patterns
Security Baselines

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 4 years

Subjects

  • Programming
  • Web
  • SQL
  • Motivation
  • Web Server
  • Web Programming
  • Web Development
  • Programming Application
  • Application
  • Application Servers

Course programme

Intro 4 lectures 17:20 Introduction and Motivation preview Well-known Vulnerabilities Overview Causes & Background Secure Programming in general Intro 4 lectures 17:20 Introduction and Motivation preview Well-known Vulnerabilities Overview Causes & Background Secure Programming in general Introduction and Motivation preview Introduction and Motivation preview Introduction and Motivation preview Introduction and Motivation preview Well-known Vulnerabilities Overview Well-known Vulnerabilities Overview Well-known Vulnerabilities Overview Well-known Vulnerabilities Overview Causes & Background Causes & Background Causes & Background Causes & Background Secure Programming in general Secure Programming in general Secure Programming in general Secure Programming in general Well-known Vulnerabilities and Secure Programming 13 lectures 55:52 Code/Command Injection (No)SQL Code Injection Cross-Site Request Forgery (CSRF) Cross-Site Scripting (XSS) Open Redirection File Inclusion / Directory Traversal Clickjacking Session-Hijacking Information Disclosure Authentification Denial of Service Middleware Third-Party Software Well-known Vulnerabilities and Secure Programming 13 lectures 55:52 Code/Command Injection (No)SQL Code Injection Cross-Site Request Forgery (CSRF) Cross-Site Scripting (XSS) Open Redirection File Inclusion / Directory Traversal Clickjacking Session-Hijacking Information Disclosure Authentification Denial of Service Middleware Third-Party Software Code/Command Injection Code/Command Injection Code/Command Injection Code/Command Injection (No)SQL Code Injection (No)SQL Code Injection (No)SQL Code Injection (No)SQL Code Injection Cross-Site Request Forgery (CSRF) Cross-Site Request Forgery (CSRF) Cross-Site Request Forgery (CSRF) Cross-Site Request Forgery (CSRF) Cross-Site Scripting (XSS) Cross-Site Scripting (XSS) Cross-Site Scripting (XSS) Cross-Site Scripting (XSS) Open Redirection Open Redirection Open Redirection Open Redirection File Inclusion / Directory Traversal File Inclusion / Directory Traversal File Inclusion / Directory Traversal File Inclusion / Directory Traversal Clickjacking Clickjacking Clickjacking Clickjacking Session-Hijacking Session-Hijacking Session-Hijacking Session-Hijacking Information Disclosure Information Disclosure Information Disclosure Information Disclosure Authentification Authentification Authentification Authentification Denial of Service Denial of Service Denial of Service Denial of Service Middleware Middleware Middleware Middleware Third-Party Software Third-Party Software Third-Party Software Third-Party Software Conclusion & Summary 1 lecture 03:47 Conclusion & Summary Conclusion & Summary 1 lecture 03:47 Conclusion & Summary Conclusion & Summary Conclusion & Summary Conclusion & Summary Conclusion & Summary

Additional information

Web Application Knowledge is a plus Being a Developer

Secure Programming of Web Applications - Developers and TPMs

£ 10 + VAT