What You'll LEARN
Created for developers with experience in any programming language, this course focuses on the most common security defects found in Web applications. To do this, each describes in detail each item included in the 2013 OWASP Top 10 list, with both an attention grabbing lecture and a hands-on lab exercise that students complete. This hands-on approach keeps developers engaged and ensures knowledge transfer of critical secure coding techniques.
- Allows developers with experience in diverse languages to learn a common body of knowledge since many of the most common issues are not language-specific
- Structure testing guidance so that it can be applied by developers or testers
- Provided remediation guidance to help eradicate specific issues
- Demonstrate how the issues are exploited by attackers
After successfully completing this course, you will:
- Understand the role of security in the software development lifecycle and how best to create secure applications
- Recognize the details of and the causes behind secure coding errors and mistakes
- Understand how these software security defects are exploited
- Understand discovery methods for these issues
- Understand the practices that help prevent the most common mistakes and lead to more secure software
This course applies to a broad audience. It is designed for professionals whose primary job function includes creating Web applications. This course is also strongly recommended for those involved with architecture and design (product and security architects and designers). Finally, QA security advocates and QA leads will find interest in the course because it improves their capability to incorporate security goals into testing.
Other Related Tools & Resources For Our Students
Be sure to check out our R&D site. We post tutorials, labs, white papers and articles to help you in your continued forensics training. There are frequently forensics videos available. If you haven't taken a course with us yet, check out some of the types of thigns you'll be doing and learning about in class.
- Android Architecture and Forensics
Android is one of the most open, versatile, and customizable mobile operating systems out there. Android is a Linux-based operating system with market share – 79.70% in smart phones. Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Android Architecture Android operating [...]
The post Android Architecture and Forensics appeared first on InfoSec Institute.
- Recycle Bin Forensics
An icon on the Windows desktop represents a directory in which deleted files are temporarily stored. This enables you to retrieve files that you may have accidentally deleted. From time to time, you’ll want to purge the recycle bin to free up space on your hard disk. You can also [...]
The post Recycle Bin Forensics appeared first on InfoSec Institute.
- Skype Forensics
Skype is an application that enables voice and video calls, instant messaging, file transfers, and screen sharing between users. Millions of people download and use Skype everyday for voice and video calling, messaging, sharing and low-cost local and international calls. If you have a Microphone and Speakers, you can use [...]
The post Skype Forensics appeared first on InfoSec Institute.