Web Application Security

Many of us deploy or develop applications that are connected to the Internet.  How do we know these are secure?  Is it possible to design secure applications to reduce the risk of successful attacks? Insecure web applications are the most commonly attacked systems on the Internet. 

This course introduces the top vulnerabilities in applications and discusses common, but often overlooked, fixes for each. Developing, configuring, and deploying secure applications minimizes attack surface and risk. Our primary objective is to increase awareness of common application vulnerabilities, discuss tactics attackers use to exploit these vulnerabilities and address mitigation options.

Upcoming Offerings

Date(s) Time Instructor(s) Location
Oct 15 - Oct 24 Evening Renner

Washington University - Lopata Hall 

More Details

Dates & Times

Mon, Oct 15, 5:30pm to 8:30pm
Wed, Oct 17, 5:30pm to 8:30pm
Mon, Oct 22, 5:30pm to 8:30pm
Wed, Oct 24, 5:30pm to 8:30pm

Location

Washington University - Lopata Hall 

map…

Instructor(s)

Chuck Renner

Objectives

This course is for developers, technical managers, incident responders, security professionals and anyone interested in the technical aspects of application security training.

  • UNDERSTAND THE FUNDAMENTALS OF APPLICATION SECURITY ON MAJOR PLATFORMS
  • UNDERSTAND APPLICATION SECURITY WEAKNESSES AND THE TECHNIQUES USED BY HACKERS TO EXPLOIT THESE WEAKNESSES
  • UNDERSTAND HOW TO DESIGN AND DEVELOP APPLICATIONS DEFENSIVELY
  • LEARN WEB APPLICATION ASSESSMENT TECHNIQUES
     

PREREQUISITES

IT Security Fundamentals or equivalent experience. 

DURATION AND PRICING

2 days (12 hours) 

FLEXIBLE OPTIONS

Contact us to customize an offering that fits your budget and specific requirements. We can deliver instructor-led training at your site, our education center, or virtually — whenever and wherever!

OUTLINE
  • INTRODUCTION
  • DESIGNING SYSTEMS FOR SECURITY
  • SECURE APPLICATION DESIGN PRINCIPLES
  • SECURE APPLICATION DEVELOPMENT TECHNIQUES
  • ASSESSING WEB APPLICATION SECURITY 
  • USING CRYPTOGRAPHY

* You may unsubscribe from our mailing list at any time using the 'unsubscribe' link at the bottom of every email. You can customize your email subscriptions here. To see how we keep your personal information secure, please visit our privacy policy.

secret