Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Plan Szkolenia
- understand the web Threats and Attack Vectors
- know the Secure Design Principles
- understand OWASP Top 10 attacks
- understand the Authentication and Authorization problems
- know how to prevent Cross-Site Scripting
- know how to prevent Cross-Site Request Forgery
- understand the secure Development Cycle
- know how to prevent Injection Attacks
- understand the protections in JDBC and JPA
- understand the Penetration Testing methodologies
- Know how to secure Java Applications
Wymagania
- Experience with Java.
- Experience of creating web applications.
21 godzin
Opinie uczestników (4)
All to topic actually including API
RODULFO ALMEDA JR - DATAWORLD COMPUTER CENTER
Szkolenie - Introduction to JavaServer Faces
The contents and the exercises
Gangoso Kim Robert - Security Bank Corporation
Szkolenie - Spring Boot for Beginners
interakcja poprzez ćwiczenia, a także dzielenie się projektami
Claudiu - MSG system
Szkolenie - Advanced Spring Boot
Przetłumaczone przez sztuczną inteligencję
The breadth of the topis covered was quite a bit and the trainer tried to do justice to that.