Your Web application written in Java is tested functionally, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -1 or -231? Because that’s what the bad guys will do – and the list is far from complete. Testing for security needs a remarkable software security expertise and a healthy level of paranoia, and this is what this course provides: a strong emotional engagement by lots of hands on labs and stories from real life. The curriculum goes through the common Web application security issues following the OWASP Top Ten but goes far beyond it both in coverage and the details.A special focus is given to finding all discussed issues during testing, and an overview is provided on security testing methodology, techniques and tools. So that you are prepared for the forces of the dark side. So that nothing unexpected happens. Nothing.
«I liked the way the course was tailored. Firstly the exercises show us how far the bad guys can attack, then secondly it teaches how to fix them.»
Java developers and testers working on Web applications
General Java and Web development, testing and QA
Cyber security basics
The OWASP Top Ten
Security testing
The OWASP Top Ten
The OWASP Top Ten
Security testing
Common software security weaknesses
Wrap up