Course Outline
• Module 1: Web Application Security
• Module 2: OWASP Top 10
• Module 3: Threat Modeling & Risk Management
• Module 4: Application Mapping
• Module 5: Authentication and Authorization Attacks
• Module 6: Session Management Attacks
• Module 7: Application Logic Attacks
• Module 8: Data Validation
• Module 9: AJAX Attacks
• Module 10: Code Review And Security Testing
• Module 11: Web Application Penetration Testing
• Module 12: Secure SDLC
• Module 13: Cryptography
Requirements
- An understanding of ___.
- Experience with ___.
- ___ programming experience.
Audience
- ___
- ___
- ___
Testimonials (5)
I liked how Gunnar wrote pretty much all of the code on the fly as we were going through, but that there was plenty of pre-prepared material on the google drive that I can refer to after the training. The code Gunnar wrote based on the sample data I provided beforehand was also extremely useful and also made the training relevant to our own datasets.
Ranvir - Schroders Personal Wealth
Course - Visual Studio Code
Topics that were discussed, lots of live code examples, trainers attitude towards group
Weronika - ATOS PGS sp. z o.o.
Course - Reactive Programming with Angular RxJS
Real-life examples.
Kristoffer Opdahl - Buypass AS
Course - Web Security with the OWASP Testing Framework
Though an online training, the interactivity with the trainer was remarkable and was always available to provide valuable sources to complement the training. I am very satisfied.
Nuno Marques - MULTICERT, S.A.
Course - Functional Reactive Programming with Java 9 and RxJava
Pacing, depth, and explanations were all superb. It's clear Scott is an expert on the subject and learning from him was super enjoyable.