Web Application Security

An introductory course about understanding Web Application Security, its importance and vulnerability in the industry.
1.6 (6 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
65 students enrolled
$19
$50
62% off
Take This Course
  • Lectures 64
  • Length 6 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 2/2014 English

Course Description

Web application security involves the security of websites and web applications. The principles of application security is applied primarily to the Internet and Web systems.

An overview of web application will be the opening topic for this course. This will be followed by an introduction to web application security and its dissimilarity to network security. Web Application Security (WAS) scanners and testing will be explained and defined. Tips on securing your web application will also be studied in this course.

What are the requirements?

  • Basic understanding of the IT industry
  • Knowledge of the English language

What am I going to get from this course?

  • Get an overview of web applications and its history, benefits, drawbacks, future, etc.
  • Be introduced to web application security and its importance.
  • Be aware of the vulnerabilities of web applications.
  • Get a clear understanding of the flaws, myths and best practices for WAS.

What is the target audience?

  • Recent graduates looking to get a foothold in the IT Industry.
  • Businesses looking to maintain information security and protect vital web-based information.
  • IT professionals looking to secure web based applications and services.
  • Managers wanting to implement Web Application Security best practices.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Overview of Web Application
00:28

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 2: Definition of Web Application

Lecture 3: Definition of Client

Lecture 4: History of Web Application

Lecture 5: Interface and Structure

Lecture 6: Benefits of Web Application

Lecture 7: Drawbacks of Web Application

Lecture 8: Web Application vs Cloud Application

Lecture 9: Future of Web Application

01:19

This lecture will talk about the definition of web application.

00:24

This discussion will focus on the definition of client.

03:49

This lecture will discuss the history of web application.

.

Lecture outline:

0:00    History of web application
1:28    Timeline of web application
03:30

This lecture will explain interface and structure in web application.

00:58

This lecture will talk about the benefits of web application.

01:49

This discussion will address a few drawbacks of web application.

03:59

This lecture will identify the difference between web application and cloud application.

.

Lecture outline:

0:00    Introduction to the similarities and differences
        of web application and cloud application
0:28    Cloud Applications
1:42    Web Applications
2:25    Conclusion
01:18

This lecture will talk about the future of web application.

Section 1 - Quiz
6 questions
11 pages

This PDF file contains Section 1 of this course. You can download the complete e book at the end of this course.

Section 2: Introduction to Web Application Security
00:29

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline


Lecture 12: Web Application Security

Lecture 13: How Does Web Application Security Work

Lecture 14: Web Application Lifecycle Maintenance

Lecture 15: Importance of Web Application Security

Lecture 16: Web Application Security vs Network Security

01:58

This lecture will discuss the security involved in web application.

05:32

This discussion will focus on how web application security works.

.

Lecture outline:

0:00    How web application security works
1:00    Programming Language
2:33    State Maintenance
4:02    Logic Implementation
10:39

This discussion will center on the maintenance of the web application lifecycle.

.

Lecture outline:

0:00    Introduction to the Web Application Lifecycle
0:27    Evaluation
1:20    Deployment
2:10    Backup
2:49    Monitoring
4:07    Job Scheduling
4:56    Upgrades
5:41    Recovery
7:06    Scaling
8:17    Tuning
9:09    Utility Management
01:31

This lecture will explain the importance of web application security.

01:40

This lecture will identify the difference between web application security and network security.

Section 2 - Quiz
6 questions
11 pages

This PDF file contains Section 2 of this course. You can download the complete e book at the end of this course.

Section 3: Web Application Vulnerabilities
00:24

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 19: What Makes Web Application Vulnerable

Lecture 20: Web Application Vulnerabilities

Lecture 21: Broken Access Control

Lecture 22: Broken Authentication and Session Management

Lecture 23: Buffer Overflows

Lecture 24: Cross Site Scripting Flaws

Lecture 25: Denial of Service

Lecture 26: Improper Error Handling

Lecture 27: Insecure Configuration Management

Lecture 28: Insecure Storage

Lecture 29: SQL Injection Flaws

Lecture 30: Unvalidated Input

Lecture 31: Defensive Measures

01:39

This lecture will talk about what makes web application vulnerable.

00:24

This lecture will talk about some vulnerable points of web application.

03:09

This discussion will center on one of the vulnerable points of web applications, namely broken access control.

03:40

This discussion will center on two of the vulnerable points of web applications, namely broken authentication and session management.

01:54

This discussion will center on one of the vulnerable points of web applications, namely buffer overflows.

01:15

This discussion will center on one of the vulnerable points of web applications, namely cross-site scripting flaws.

02:41

This discussion will center on one of the vulnerable points of web applications, namely denial of service.

01:14

This discussion will center on one of the vulnerable points of web applications, namely improper error handling.

02:32

This discussion will center on one of the vulnerable points of web applications, namely insecure configuration management.

02:17

This discussion will center on one of vulnerable points of web applications, namely insecure storage.

01:17

This discussion will center on one of the vulnerable points of web applications, namely SQL injection flaws.

03:31

This discussion will center on one of the vulnerable points of web applications, namely unvalidated input.

02:24

This discussion will center on one of the vulnerable points of web applications, namely defensive measures.

Section 3 - Quiz
6 questions
13 pages

This PDF file contains Section 3 of this course. You can download the complete e book at the end of this course.

Section 4: Web Application Security Scanner and Testing
00:24

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 34: Definition of Web Application Security Scanner

Lecture 35: Tool Types

Lecture 36: Functional Requirements

Lecture 37: Issues with Web Application Security Scanner

Lecture 38: Strengths and Weaknesses

Lecture 39: Definition of Web Application Security Testing

Lecture 40: Importance of Web Application Security Testing

Lecture 41: Is Web Application Security Testing a Waste of Time?

Lecture 42: Guide for Web Application Security Testing

02:51

This discussion will center on the definition of web application security scanner.

02:27

This lecture will identify the different tool types of a web application security scanner.

00:28

This lecture will talk about functional requirements of a web application security scanner.

03:08

This lecture will identify the different issues with a web application security scanner.

03:19

This lecture will identify the strengths and weaknesses of a web application security scanner.

.

Lecture outline:

0:00    Introduction
0:05    Strengths
0:36    Weaknesses
04:22

This lecture will discuss the definition of web application security testing.

01:31

This discussion will focus on the significance of web application security testing.

01:04

This lecture will examine whether testing web application security is a waste of time.

08:56

This lecture will provide a guide for web application security testing.

.

Lecture outline:

0:00    Introduction
0:13    Step One: Objectives
1:05    Step Two: Process and Reporting
1:39    Step Three: Tracking Results
2:29    Step Four: Test Environment
3:01    Step Five: Usability Testing
3:54    Step Six: Unit Testing
4:53    Step Seven: Verifying the HTML
6:33    Step Eight: Load Testing
7:16    Step Nine: User Acceptance Testing
7:42    Step Ten: Testing Security
Section 4 - Quiz
6 questions
17 pages

This PDF file contains Section 4 of this course. You can download the complete e book at the end of this course.

Section 5: Protecting, Improving and Some Guidelines for WAS
00:29

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 45: Protecting Against Attack and Misuse

Lecture 46: Basic Guidelines for Providing Security

Lecture 47: Improving Security

Lecture 48: Web Application Security Plan

04:48

This discussion will focus on protection against attack and misuse of web application security.

.

Lecture outline:

0:00    Introduction on Protecting Against Attack and Misuse
0:10    Adapt Policies for Dynamic Application Environments
0:45    Protect both Infrastructure and Users
1:21    Implement Key Cloaking Capabilities
2:00    Prevent Leakage
2:56    Don't Block Nonthreatening Traffic
3:25    Deploy Consistent Security
4:10    Defeat Zero-day Attacks
02:18

This discussion will center on some basic guidelines for providing security.

.

Lecture outline:

0:00    Guidelines for Web Application Security
0:25    Continuously Monitor and Review
0:40    Discover and Crete Baselines
1:29    Shield your Application and Control Damage
1:52    Assess and Assign Risks
01:53

This lecture will talk about improving the security of web application.

02:30

This lecture will discuss the web application security plan.

Section 5 - Quiz
6 questions
6 pages

This PDF file contains Section 5 of this course. You can download the complete e book at the end of this course.

Section 6: Tips Securing Web Applications
00:24

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 51: Tips on Securing Web Applications

17:41

This lecture will identify some tips on securing web applications.

.

Lecture outline:

0:00    Introduction on Tips to Securing Web Applications
0:37    The Requirement Stage
1:50    The Design Stage
10:23   The Development Stage
14:16   The Pre-Production Stage
14:44   The Maintenance and Support Stage
Section 6 - Quiz
6 questions
9 pages

This PDF file contains Section 6 of this course. You can download the complete e book at the end of this course.

Section 7: Flaws, Myths and Best Practices for WAS
00:31

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 54: Security Flaws

Lecture 55: Myth and Reality

Lecture 56: Best Practices for Creating Secure Web Applications

Lecture 57: Conclusion

02:54

This lecture will expose a few security flaws in web application security.

.

Lecture outline:

0:00    Introduction to the Security Flaws in Web Application Security
0:10    Incorrect Handling
1:01    Information Leakage
1:46    Injection Vulnerabilities
04:54

This lecture will identify some myths surrounding web application security and explain its realities.

05:31

This discussion will focus on some best practices involved in creating a secure web application.

.

Lecture outline:

0:00    Introduction to Best Practices in Web Application Security
0:55    Training and Building Awareness
2:12    Business Requirements and Risk Assessment
3:27    Design and Implementation
5:13    Acceptance for Security
03:21

This lecture will end the course by citing and discussing conclusions drawn about web application security.

Section 7 - Quiz
6 questions
9 pages

This PDF file contains Section 7 of this course. You can download the complete e book at the end of this course.

Section 8: Course Resources
118 pages

This e book contains the entire Web Application Security course in a PDF format.

1 page

This e book contains the entire Web Application Security course in a PDF format.

7 pages

This PDF file contains all the answers to all the quizzes in each section of this course.

Section 9: Web Application Security Certification
1 page

Now that you've finished your Udemy course, - you are eligible to sit your official Certification exam.

Certification is not mandatory.

Once you've completed the course, email our exam department at exams@artofservice.com.au to purchase your exam voucher and sit your final exam.

. Access includes a step-by-step procedure on how to take the final exam and how to obtain your exam certification.

You will receive a PDF certificate through your email upon passing the examination.

1 page

We are always in the process of improving our courses and procedures for a better learning experience for our students. Your input is very important to us.

Follow the step-by-step procedure on taking the evaluation and receiving your certificate of completion.

01:27

A final message from our CEO.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

The Art Of Service, Quality education for Career Driven IT Professionals

What drives us?

In one word? YOU

You are front, center and behind every decision we make in our business.

  • You are starting out in the IT industry
  • You are serious about your career
  • You need certifications on your resume to get that first interview

For you we created the Foundation level courses as well as the Core Series for IT

  • You are an IT Professional with a proven career
  • You need to stay in touch with changes in the industry
  • You need to continue to show your value to the business to ensure your job is secure
  • You want to find out what else would make your IT career more solid

For you we created the Specialist and Intermediate level courses as well as the Core Series for IT

  • You are implementing Processes and methodologies in your company
  • You are managing a team of people and need to look good
  • You started your own business and are looking for template documents to ‘hit the ground running’
  • You need to present on a subject at the next team meeting and are not quite sure where to start

For you we created the Toolkits as well as the Core Series for IT


Our motto:
Every Career driven IT Professional needs to be able to afford quality IT educational materials to stay relevant in their job, irrespective of current position, budget or geographical location.

We do most of the work behind the scenes so that you can focus on your professional education and your career within the IT industry.

We see it as our job to ensure we give you the most up to date information you need to succeed in achieving that goal at a price-point that is makes it accessible to most professionals.

Ready to start learning?
Take This Course