Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Secure Programming of Web Applications - Developers and TPMs

    Posted By: Sigha
    Secure Programming of Web Applications - Developers and TPMs

    Secure Programming of Web Applications - Developers and TPMs
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English (US) | Size: 725.35 MB | Duration: 1h 49m

    Web Application Security for Software Developers and Technical Project Managers

    What you'll learn
    Security of Web Applications
    Secure Programming Patterns
    Security Baselines
    Secure Coding

    Requirements
    Web Application Knowledge is a plus
    Being a Developer

    Description
    Understand Application Security: Numerous successful attacks on well-known web applications on a weekly basis should be reason enough to study the background of "Web Application Security" of custom-made or self-developed applications.Computer systems are ubiquitous and part of our working and private everyday life. For companies it is increasingly complex and difficult to keep up their IT security with the current technical progress. Large enterprises establish security processes which are created according to industry standards (e.g., ISO 27001). These processes are very complex and can only be implemented by teams of security experts. Constant quality assurance, maintenance and adaptation also belong to an IT security process.It does not matter if a company develops products or runs an online shop, IT security is a characteristic feature. Security incidents, which maybe even reach public uncontrolled, do not only damage the business image but may also lead to legal or financial consequences.IntroTypical Vulnerabilities OverviewCause & BackgroundSecure Programming in generalCode/Command Injection in general(No)SQL Code InjectionCross-Site Request Forgery (CSRF)Cross-Site Scripting (XSS)Open RedirectionFile Inclusion / Directory TraversalClickjackingSession-HijackingInformation DisclosureAttacks on Weaknesses of the AuthenticationDenial of ServiceMiddlewareThird-Party SoftwareSummary and ConclusionThe principles taught in this course are language and platform independent. However, the course will include examples for Java and PHP.Instructor Frank Hissen, Computer Scientist and Security Expert, teaches IT security for over 20 years and works for companies of all sizes as IT Security Consultant and Software Engineer.

    Who this course is for:
    Software Developer, Web Developer


    Secure Programming of Web Applications - Developers and TPMs


    For More Courses Visit & Bookmark Your Preferred Language Blog
    From Here: English - Français - Italiano - Deutsch - Español - Português - Polski - Türkçe - Русский