Course Outline
- understand the web Threats and Attack Vectors
- understand Secure Design Principles
- understand the OWASP Top 10 attacks
- understand the Authentication and Authorization problems
- how to prevent Cross-Site Scripting
- how to prevent Cross-Site Request Forgery
- understand the secure Development Cycle
- how to prevent Injection Attacks
- understand the Penetration Testing methodologies
- how to secure ASP.net Applications
Requirements
Experience with ASP.net
Experience of creating web applications
Testimonials
The OWASP overview, especially slides with the specific examples of attacks. OWASP Zap tool.
- Corvil
I saw some security risk being easier to use than I expected It helped us to find some security holes in our Product
- Corvil
Tutorials
ICAO
The example and exercise
ICAO
I got more information regarding the web applications' security issues, the different tools that could be used to cope with these issues, and more advice from the trainer to handle all these issues.
ICAO
the list of tools
ICAO
how it was broken into the technical and security mindset aspects.
ICAO
Excercises.
ICAO
he is very knowledgeable and comprehensive.
ICAO
Matthew was very knowledge and has lot experience to share with us. it was very pleasant, as he take the time to listen to us and answer to our questions. Thank you Matthew, it was awesome.