when you buy 3 or more coursesThe discount will be automatically
There are no open public schedule dates for Cyber Security course. We can offer you a private training or arrange a public course for you. Contact us here and we can make arrangements for your course.
This Cyber Security course explains how to protect your applications and websites. After completing our Cyber Security course you will be able to implement a step by step security plan for your web application.
Few practical Cyber Security based projects at the end of the course will ensure that you can apply Cyber Security on your web projects.
This short Cyber Security course is hands-on, instructor-led and classroom based. This training can be taken as a part-time evening course or even on the weekends. A list of all upcoming public Cyber Security training courses is given on training dragon website.
This course is for you if you are interested in protecting your web applications. This course is attended by developers, testers, database administrator and security managers.
Training Dragon consultants have been implementing professional Cyber Security solutions across a range of web sites for many years. Those consultants write and teach our Cyber Security training courses, so their experience directly informs course content.
Our Cyber Security courses are designed to get you started in Cyber Security development. We work on industry related projects in this Cyber Security course.These projects help you create your Cyber Security portfolio.
Cyber Security electronic notes are included in this course.
After completing this training your will be receive an Cyber Security course completion certificate.
After the course if you have any problems or questions regarding Cyber Security do not hesitate to contact us. Training Dragon’s trainers are expert in their fields and if you need any help with you career choice, please speak to one of our trainers.
Part 1: Web Application Security
1. Basics of authorization
2. Session management
3. Data validation
4. Brute-force attacks
5. Predicable sessions
6. Session Fixation
7. Insecure logging
8. User enumeration attacks
Part 2: OWASP
2. Cross-site Scripting
3. Broken authentication and session management
4. Insecure direct object references
5. Security Misconfiguration
6. Sensitive data exposure
7. Missing functional level access control
8. Cross-site request forgery (CSRF)
9. Using components with known vulnerabilities
10. Un-validated redirects and forwards
1. Insecure Storage
2. Insecure Cross-Domain Requests
3. Malicious iFrames