Information Technology
Star icon
Most Popular
Hands on Training icon
Hands On Training
Star icon
Hands on Training icon

Application Security : The Complete Guide

Course Cover
compare button icon

Course Features

icon

Duration

8.92 hours

icon

Delivery Method

Online

icon

Available on

Lifetime Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Beginner

icon

Teaching Type

Self Paced

icon

Video Content

8.92 hours

Course Description

This course will help you to understand the most common vulnerabilities in developed code, as outlined by publications such as the owasp top 10, and sans top 25. You will learn which development behaviors can lead to vulnerabilities and how you can avoid them when creating secure code. To understand how threats to your code can impact your code, how to mitigate them, you will need to create a threat model of development features. You will also learn how to use analysis tools available to developers to analyze their code and find vulnerabilities. This will allow you to correct them as early as possible in the development cycle. You will also learn how application security fits into a comprehensive cyber security program.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Hands-On Training,Instructor-Moderated Discussions

Skills You Will Gain

Prerequisites/Requirements

Basic programming knowledge

Understanding of IT systems and how software is deployed in operational environments

What You Will Learn

How application security fits in an overall cyber security program

How to perform a threat model on an application

Rating security vulnerabilities using standard and open processes

What is the OWASP Top 10 and how to defend against those vulnerabilities

Course Cover