Node.js and Web Application Security
Scademy
As a developer, your duty is to write bulletproof code. However... What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? What if they could steal away your database and sell it on the black market?
Who Should Attend
- Developers
Prerequisites
- General Web application development
What You Will Learn
- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Learn about XML security
- Learn client-side vulnerabilities and secure coding practices
- Learn about Node.js security
- Have a practical understanding of cryptography
- Understand security concepts of Web services
- Learn about JSON security
- Learn about MongoDB security
- Learn about typical coding mistakes and how to avoid them
- Get information about some recent vulnerabilities in the Java framework
- Learn about denial of service attacks and protections
- Get sources and further readings on secure coding practices
Course Outline
Labs & Practical Exercises
This training program exclusively targets engineers developing software applications or network equipment for the telecom sector. Our dedicated trainers share their experience and expertise through hands-on labs, and give real-life case studies from the telecom industry – engaging participants in hands-on labs to realize the harsh consequences of insecure coding. Participants will work with Java security features, cryptographic implementations, network security tools, and native code vulnerability exploitation and mitigation techniques.
Certification & Assessment
Certificate of Completion. This course equips participants with the knowledge and skills necessary to build secure applications and network equipment for the telecom sector, addressing the unique security challenges of IP-based telecommunication and IoT devices.
