Overview:
This Course Introduces participants to fundamental concepts and methods for developing secure web applications and testing procedures. It Shows possible threats, actual attacks, and approaches to defense, through real-life examples. Assessing the impact of vulnerabilities on assets.
Audience:
Software Developers, Architects, Project Managers, Applications Project Leaders and professionals concerned with web application security and testing.
Pre-Requisites:
N/A
Course Curriculum
Web Application Security Fundamentals | |||
What is the Web Application Security Details | 00:00:00 | ||
What are the risks faced by a web service Details | 00:00:00 | ||
What security model is adopted today Details | 00:00:00 | ||
Web Application Vulnerabilities: Critical & Latest Updates | |||
The vulnerabilities, attacks and countermeasures necessary to protect Details | 00:00:00 | ||
The OWASP Top 10 vulnerabilities Details | 00:00:00 | ||
Examples and real cases Details | 00:00:00 | ||
Introducing Security in SDLC (Software Development Life Cycle) | |||
How to introduce a security processes at all stages of SDLC Details | 00:00:00 | ||
Web Application Risk Assessments | |||
How can you run a risk analysis model Details | 00:00:00 | ||
Identification of threats and their countermeasures Details | 00:00:00 | ||
Architectural design guidelines and principles of safety Details | 00:00:00 | ||
Penetration Testing Fundamentals | |||
What is a Web Application Penetration Testing (WAPT) Details | 00:00:00 | ||
What is a Vulnerability Assessment Details | 00:00:00 | ||
The methodology for the OWASP WAPT Details | 00:00:00 | ||
Introduction to open source tool to assist a WAPT Details | 00:00:00 | ||
Web Application Penetration Testing Methodologies | |||
Information Gathering Details | 00:00:00 | ||
Business Logic Testing Details | 00:00:00 | ||
Authentication Testing Details | 00:00:00 | ||
Session Management Testing Details | 00:00:00 | ||
Data Validation Testing Details | 00:00:00 | ||
Denial of Service Testing Details | 00:00:00 | ||
Web Services Testing Details | 00:00:00 | ||
Ajax Testing Details | 00:00:00 | ||
Identifying Vulernabilities, Measuring Risk & Prioritising Action | |||
How to identify priorities among the identified vulnerable Details | 00:00:00 | ||
How to make a particular model of risk assessment Details | 00:00:00 |
Course Reviews
No Reviews found for this course.
0 STUDENTS ENROLLED