Plan Szkolenia

  • understand the web Threats and Attack Vectors
  • know the Secure Design Principles
  • understand OWASP Top 10 attacks 
  • understand the Authentication and Authorization problems
  • know how to prevent Cross-Site Scripting
  • know how to prevent Cross-Site Request Forgery
  • understand the secure Development Cycle
  • know how to prevent Injection Attacks
  • understand the protections in JDBC and JPA
  • understand the Penetration Testing methodologies
  • Know how to secure Java Applications

Wymagania

  • Experience with Java.
  • Experience of creating web applications.
 21 godzin

Liczba uczestników



Cena za uczestnika

Opinie uczestników (4)

Szkolenia Powiązane

Powiązane Kategorie