PDF Add to WishList
Organizations must apply penetration testing tools to ensure the security of their web applications and limit their vulnerability against cyber attacks. In this training course, you gain in-depth experience securing web-based applications and host servers, and learn how to integrate robust security measures into the web application development process by adopting proven architectures and best practices.
Modeling web security
Encrypting and hashing
Configuring security for HTTP services
Securing communication with SSL/TLS
Detecting unauthorized modification of content
Employing OWASP resources
Securing database and application interaction
Managing session authentication
Controlling information leakage
Performing input validation
Assessing risks and evaluating threats
Diagnosing XML vulnerabilities
Protecting the SOAP message exchange
Operating and configuring scanners
Detecting application flaws
Managing network security
Course Tuition Includes:
After-Course Instructor Coaching
When you return to work, you are entitled to schedule a free coaching session with your instructor for help and guidance as you apply your new skills.
After-Course Computing Sandbox
You'll be given remote access to a preconfigured virtual machine for you to redo your hands-on exercises, develop/test new code, and experiment with the same software used in your course.
Free Course Exam
You can take your Learning Tree course exam on the last day of your course or online at any time after class and receive a Certificate of Achievement with the designation "Awarded with Distinction."
Standard Course Hours: 9:00 am – 4:30 pm
*Informal discussion with instructor about your projects or areas of special interest: 4:30 pm – 5:30 pm
FREE Online Course Exam (if applicable) – Last Day: 3:30 pm – 4:30 pm
By successfully completing your FREE online course exam, you will:
“Taking a Learning Tree system and network security course live, online via AnyWare was valuable to me because I did not have to make the long drive to class every day.”
- R. Scott, Business Analyst