This auction has been won.
View other items offered by JayDuo69
Leading
Newmann203 1 × R1.00
23 Apr 20:28

Similar products

97% OFF
ANY Tony Robbins Audio Course/Program + BONUSES [Refer Description to Select | ON-DEMAND ACCESS]
R149.00 R4,980.00
advanced_power point course
R150.00
48% OFF
International Yoga Teacher Training Course - Online YTTC 10 Month Payment Plan
R1,400.00 R2,700.00
Books - Excel Programming
R40.00
Secure Programming of Web Applications - Developers and TPMs online course
Sold

Secure Programming of Web Applications - Developers and TPMs online course

Digital product
1 was available / new
Indicative market price: R1,999.00
R30.00 minimum increment
R1.00
R899.00
55% off
Shipping
This is a digital product (eg. voucher, product license, service, etc.) and does not require shipping. The seller will be in contact to deliver this product to you electronically.
The seller has indicated that they will usually have this item ready to ship within 2 business days. Shipping time depends on your delivery address. The most accurate delivery time will be calculated at checkout, but in general, the following shipping times apply:
 
Standard Delivery
Main centres:  1-3 business days
Regional areas: 3-4 business days
Remote areas: 3-5 business days
Get it now, pay later

Product details

Condition
New
Location
South Africa
Bob Shop ID
641586530

Understand Application Security: Numerous successful attacks on well-known web applications on a weekly basis should be reason enough to study the background of "Web Application Security" of custom-made or self-developed applications.

Computer systems are ubiquitous and part of our working and private everyday life. For companies it is increasingly complex and difficult to keep up their IT security with the current technical progress. Large enterprises establish security processes which are created according to industry standards (e.g., ISO 27001). These processes are very complex and can only be implemented by teams of security experts. Constant quality assurance, maintenance and adaptation also belong to an IT security process.

It does not matter if a company develops products or runs an online shop, IT security is a characteristic feature. Security incidents, which maybe even reach public uncontrolled, do not only damage the business image but may also lead to legal or financial consequences.

  • Intro

  • Typical Vulnerabilities Overview

  • Cause & Background

  • Secure Programming in general

  • Code/Command Injection in general

  • (No)SQL Code Injection

  • Cross-Site Request Forgery (CSRF)

  • Cross-Site Scripting (XSS)

  • Open Redirection

  • File Inclusion / Directory Traversal

  • Clickjacking

  • Session-Hijacking

  • Information Disclosure

  • Attacks on Weaknesses of the Authentication

  • Denial of Service

  • Middleware

  • Third-Party Software

  • Summary and Conclusion

The principles taught in this course are language and platform independent. However, the course will include examples for Java and PHP.

Recently viewed

See more
PHP MySQL & JavaScript All-in-One For Dummies - Richard Blum
R989.00
Object-Oriented Software Engineering Using UML Patterns and Java: Pe - Bernd Bruegge
R525.00
AVR ISP ATtiny44 USBTinyISP Programmer Bootloader CJMCU for Arduino - products that work with offici
R400.00
ESP32-Aduio-Kit WiFi+ bluetooth Module ESP32 Serial to WiFi Audio Development Board with ESP32-A1S
R649.00