|
|
|
|
|
|
|
|
|
Secure Web Application Development |
Duration: 2 days |
|
|
This
course is designed for Web application developers and architects who have at least
one year of Web application development experience using HTML, Java, Perl, ASP, or PHP.
- Application developers
- Architects
- IT Managers
- Administrators and other personnel responsible for security management
|
|
- Audience for this course is expected to have basic understanding of the
overall Web technologies.
- Must also understand basic HTML.
- Programming experience in any of the popular languages/tools for Web
applications is a must, such as Java, Perl, ASP, or PHP.
This course can be customized to use a particular language/tool/environment to
meet the participants needs. |
|
|
Description |
This intensive two-day course covers the issues that face the development of secure, Web-based applications for the enterprise. It first gives students an overview of security vulnerabilities that today's Web applications are exposed to and the cryptography theory and protocols that are behind modern security architecture.
The course then focuses on the programming techniques and best practices for building a secure Web application. It will list some common security attack techniques and how to best address them. Some commonly used tools will also be introduced that can help detect, monitor, and repair security break-ins. |
|
Objectives |
- Understand the security problems that face Web applications
- Understand the basic cryptography theory that's behind Web security
architecture and protocols
- Set up digital certificates for the client and server
- Understand common security attacks and their counter measures
- Discover break-ins
- Utilize secure programming techniques to fend off security threats
- Respond in the face of attacks
- Understand programming techniques to protect privacy
|
|
Course Outline |
Overview of Web Security
- Web security problems
- Cryptography and the Web
- Digital certificates
- Understanding SSL
Secure Programming Techniques
- Tips on avoiding security-related bugs
- Tips on writing network programs
- Validating and securely storing data
- Java security model and programming
|
|
Security Attacks and Responses
- Discovering a break-in
- Protecting against programmed threats
- Denial of service attacks and solutions
- Mobile code attacks - downloaded code
- Hidden field manipulation
- Application buffer overflow
- Cross-site scripting
- Incident response processes
- Tools of the trade - Essential tools for managing Web security
Web Security and Privacy
- Understanding privacy
- Privacy-protection techniques
|
|
|
|