Many of us deploy or develop applications that are connected to the Internet. How do we know these are secure? Is it possible to design secure applications to reduce the risk of successful attacks? Unsecure web applications are the most commonly attacked systems on the Internet. These unsecure systems often provide an interface into PHI, PII, or other sensitive data that attackers find lucrative.
This course opens your eyes to the top vulnerabilities in applications and discusses common, but often overlooked, fixes for each. Developing, configuring, and deploying secure applications minimizes attack surface and risk. This course's primary objective is to increase awareness on common application vulnerabilities, discuss tactics attackers use to exploit these vulnerabilities, and address mitigation op
- Security Concepts
- Security Principles
- Common Vulnerabilities
- Web Services Vulnerabilities
- AJAX Vulnerabilities
- Secure Software Development Life Cycle
- Testing Tools and Methods
• Understand the fundamentals of Application Security
• Understand application security weaknesses and the techniques used by hackers to exploit these weaknesses
• Understand how to design and develop applications defensively
• Learn web application assessment techniques
This course is for developers, technical managers, incident responders, security professionals and anyone interested in the technical aspects of application security training.
Applies Towards the Following Certificates
- Cyber Security Essentials : Required