pds-it
['Product detail page','no']
Software development / software architecture
The illustrations were created in cooperation between humans and artificial intelligence. They show a future in which technology is omnipresent, but people remain at the center.
AI-generated illustration

iSAQB® Web Security (WEBSEC)

Robust security architectures for modern web systems (CPSA Advanced Level)

Online
3 days
German
Download PDF
€ 2.190,-
plus VAT.
€ 2.606,10
incl. VAT.
Booking number
42597
Venue
Online
2 dates
€ 2.190,-
plus VAT.
€ 2.606,10
incl. VAT.
Booking number
42597
Venue
Online
2 dates
Become a certified
Machine Learning Engineer
This course is part of the certified Master Class "Machine Learning Engineer". If you book the entire Master Class, you save over 15 percent compared to booking this individual module.
To the Master Class
In-house training
In-house training just for your employees - exclusive and effective.
Inquiries
In cooperation with
In cooperation with
ITech Progress
Web security is a key pillar for protecting sensitive data and ensuring the stability of digital systems. In an increasingly networked world, cybercriminals specifically target vulnerabilities in web applications and services in order to compromise systems, disrupt services, or steal confidential information. Inadequate security can have serious consequences—from financial losses and legal consequences to a massive loss of trust among customers partners. Modern attack techniques are constantly evolving, which is why you should continuously adapt your security strategies and regularly check web applications for vulnerabilities. Effective protective measures such as secure authentication and authorization concepts, encryption, firewalls, and proactive vulnerability analyses are essential for minimizing risks and increasing system resilience. Sustainable protective mechanisms can only be established through the consistent integration of security principles into architecture and development.
Contents

The training essential knowledge and skills to effectively protect web applications from cyber attacks. In addition to the basics of web security, the focus is on implementing robust protection mechanisms, analyzing and remedying vulnerabilities, and strong authentication and authorization procedures. In the training, you will learn how to use firewalls and encryption techniques in a targeted manner, identify points of attack at an early stage, and seamlessly integrate security measures into existing systems—for maximum protection and resilience.
 

Fundamentals of web security:

  • Protection goals such as confidentiality, integrity, and availability.
  • Threat analysis and risk management.

 

Firewalls and encryption:

  • Use of packet filters, web application firewalls, and intrusion detection systems.
  • Use of symmetric and asymmetric encryption methods.

 

Vulnerability analysis:

  • Identification of security vulnerabilities through penetration testing and fuzzing.
  • Use of tools for automated security analysis.

 

Authentication and authorization:

  • Concepts such as multi-factor authentication and single sign-on.
  • Implementation of OAuth, OpenID Connect, and SAML.

 

Safety guidelines and standards:

  • Introduction to ISO 27000, OWASP, BSI basic protection, and PCI DSS.
  • Creation and implementation of secure development guidelines.

 

Data protection and GDPR-compliant development:

  • Protection of personal data and legally compliant storage.
  • Measures to comply with GDPR requirements.

 

Requirements: 

  • You should understand HTML, CSS, and JavaScript.
  • You need basic knowledge of protocols and data transmission.
  • You should have already created or collaborated on web applications.
  • A basic understanding of IT security is helpful.
  • You should be open to new security concepts and best practices.
  • Practical experience with software or system architecture is an advantage.

 

Technical requirements:

There are no special requirements for the training environment, as the exercises take place using cloud- and web-based tools such as Miro, Draw.io, and platforms such as Jupyter or HuggingFace. All that is needed is a stable and sufficiently fast internet connection.

Learning environment
Your benefit
  • You identify risks, threat models, and security vulnerabilities at an early stage.
  • You develop applications according to security-by-design principles.
  • You understand common attack vectors and implement protective measures.
  • You apply encryption, hashing, and trust models securely.
  • You secure systems with firewalls, IDS, and secure protocols.
  • You implement learned security concepts directly in development.

 

Your advantages at a glance: 

  • Sound web security: Identify security risks and minimize them in a targeted manner.
  • Practical methods: Apply proven security concepts directly.
  • Recognized certification: Demonstrate your professional competence and improve your career opportunities.
trainers
No items found.
Methods
  • Visual collaboration through, for example, whiteboarding
  • High level of interactivity through customized exercises and breakout rooms
  • Ideal trainer support even in the breakout rooms
Certification

Credit points for CPSA-A certification:

With the WEBSEC training course, attendees earn attendees technical and 10 methodological credit points according to the iSAQB Advanced Level Program.

Recommended for
Start dates and details

Form of learning

Learning form

23.2.2026
Online
Places free
Implementation secured
Online
Places free
Implementation secured
25.11.2026
Online
Places free
Implementation secured
Online
Places free
Implementation secured

The training is carried out in cooperation with an authorized training partner. This partner collects and processes data under its own responsibility. Please take note of the corresponding privacy policy.

No items found.
No items found.
*Mandatory fields

Do you have questions about training?

Call us on +49 761 595 33900 or write to us at service@haufe-akademie.de or use the contact form.

The illustrations were created in cooperation between humans and artificial intelligence. They show a future in which technology is omnipresent, but people remain at the center.
AI-generated illustration