Suggested region and language based on your location

    Your current region and language

    Web Application Defence: Secure Coding (Java/.NET/PHP) training course

    Web Application Defence: Secure Coding (Java/.NET/PHP) training course

    Duration 2 days
    Available to book: Public classroom Book now
    Available to quote: In-house Book now

    Look at web applications and their coding through the eyes of the hacker on our two-day Web Application Defence: Secure Coding (Java/.NET/PHP) training course. You'll gain insight into the insecurities, vulnerabilities and exploits that lie within web applications so you can reduce the risk this poses to your business.

     

    By attending this course you'll gain a detailed understanding of web application defence for Java/.NET/PHP and best practice approaches to apply secure coding and secure design and development to identify and eliminate risks. Plus you'll get the opportunity to sample our vulnerable web application and experience a series of practical activities that help put this theory into practice.

    How will I benefit?

    • Gain insight into the insecurities, vulnerabilities and exploits that lie within your web applications
    • Confidently identify and eliminate these new risks before they result in damage to the organization
    • Enhanced knowledge of web application defence for Java/.NET/PHP
      • Web application security
      • Authentication
      • Session management
      • Authorisation
      • Data validation
      • Information disclosure
      • Code injection
      • SQL injection prevention
      • Parameterised SQL queries
      • Misuse & Misdirection
      • Operating system command injection
      • Cross site scripting
      • Path traversal
      • OWASP top 10
      • Threat modelling
      • Security methodology
    • Those responsible for developing, managing, testing or maintaining web based applications or anyone with an interest in the security of their web presence, including:

      • Web application developers
      • Compliance officers
      • Technical managers
      • Information security team members
      • IT Managers
      • Team leaders
      • Comprehensive course materials
      • Penetration testing toolkit
      • Access to our vulnerable web application
      • Certificate of attendance
      • Lunch
      • Refreshments
    Contact Us

    Let's shape your organization's future together

    Reach out and see how we can help guide you on your path to sustainable operational success.

    Get in touch