
Studies show that over 90% of all web applications have serious security flaws, even though effective countermeasures exist for most types of attacks. Vulnerabilities are usually found in architecture and design, application logic, program code, third-party libraries, or deployment and configuration.
Based on the OWASP Top 10, you will learn about the latest methods of attacking (web) applications and find out how effective protective measures should be taken:
Requirements:
Basic knowledge of web application development, experience with web servers, and fundamental knowledge of web technologies such as HTML and JavaScript are required.
This course consists of training training and is led by a trainer who supervises the participants live. Theory and practice are taught with live demonstrations and practical exercises. The video conferencing software Zoom is used.
This course is aimed at software developers testers, webmasters,developers publishers, system engineers and administrators, CISOs, and IT security managers.
Form of learning
Learning form
No filter results
The training is carried out in cooperation with an authorized training partner. This partner collects and processes data under its own responsibility. Please take note of the corresponding privacy policy.
