This auction has been won.
View other items offered by JayDuo255
Leading
MoCass5752586 1 × R31.00
21 Mar 09:14
Runner-up
DivanPotgieter119 1 × R1.00
21 Mar 09:02

Similar products

36% OFF
Laughter Coaching Certified Course - Laughter Yoga Course: Online
New
R1,800.00 R2,800.00
98% OFF
ChatGPT masterclass Online Video Course
New
R49.00 R1,999.00
95% OFF
BUILD Your Own Digital Resource Library: ANY eBooks/Courses/Programs [Stored on/to 32GB USB Drive]
New
R2,299.00 R47,999.00
Acrylic Workbook a complete course in 10 lessons
Secondhand
R115.00
Secure Programming of Web Applications - Developers and TPMs online course
Sold

Secure Programming of Web Applications - Developers and TPMs online course

Digital product
New 1 was available
Indicative market price: R1,999.00
R30.00 minimum increment
R31.00
R899.00
55% off
Shipping
This is a digital product (eg. voucher, product license, service, etc.) and does not require shipping. The seller will be in contact to deliver this product to you electronically.
The seller has indicated that they will usually have this item ready to ship within 2 business days. Shipping time depends on your delivery address. The most accurate delivery time will be calculated at checkout, but in general, the following shipping times apply:
 
Standard Delivery
Main centres:  1-3 business days
Regional areas: 3-4 business days
Remote areas: 3-5 business days
Get it now, pay later

Product details

Condition
New
Location
South Africa
Bob Shop ID
639220934

Understand Application Security: Numerous successful attacks on well-known web applications on a weekly basis should be reason enough to study the background of "Web Application Security" of custom-made or self-developed applications.

Computer systems are ubiquitous and part of our working and private everyday life. For companies it is increasingly complex and difficult to keep up their IT security with the current technical progress. Large enterprises establish security processes which are created according to industry standards (e.g., ISO 27001). These processes are very complex and can only be implemented by teams of security experts. Constant quality assurance, maintenance and adaptation also belong to an IT security process.

It does not matter if a company develops products or runs an online shop, IT security is a characteristic feature. Security incidents, which maybe even reach public uncontrolled, do not only damage the business image but may also lead to legal or financial consequences.

  • Intro

  • Typical Vulnerabilities Overview

  • Cause & Background

  • Secure Programming in general

  • Code/Command Injection in general

  • (No)SQL Code Injection

  • Cross-Site Request Forgery (CSRF)

  • Cross-Site Scripting (XSS)

  • Open Redirection

  • File Inclusion / Directory Traversal

  • Clickjacking

  • Session-Hijacking

  • Information Disclosure

  • Attacks on Weaknesses of the Authentication

  • Denial of Service

  • Middleware

  • Third-Party Software

  • Summary and Conclusion

The principles taught in this course are language and platform independent. However, the course will include examples for Java and PHP.

Recently viewed

See more
Arduino (A000093 ) Development Board, Arduino Micro
New
R1,135.00
PIC Microcontroller USB Automatic Programming Programmer MCU Microcore Burner USB Downloader K150 +
New
R474.00
DFRobot, Gravity: Starter Kit for Arduino
New
R3,385.00
T23 Wireless Bluetooth Game Handle With Vibration And Wake Up Macro Programming Function Handle F...
New
R447.30