Developers Trainings
Courses | Description |
---|---|
IIEH Secure Java Developer | ESAPI Framework • OWASP Top 10 • Countermeasures in JAVA • J2EE Security • Application Security • Testing Methodologies • Struts • JAAS • Authentication & Authorization • Cryptography • Framework Security • OWASP Secure Code Guidelines • Secure Coding Best Practices |
IIEH Secure .NET Developer | Cryptography • OWASP Top 10 • Countermeasures in .Net • Testing Methodologies • Role Based Security • Code - Access Security • Application Security • Authentication & Authorization • Framework Security • OWASP Secure Code Guidelines • Secure Coding Best Practices |
IIEH Secure PHP Developer | Security in php.ini • OWASP Top 10 • Security in php.ini • Secure File Upload• Authentication & Authorization Issues • Code - Access Security • Application Security • Authentication & Authorization • Framework Security • OWASP Secure Code Guidelines • Secure Coding Best Practices |
IIEH Web Application Security Professional | Threat Modeling • Cross-Site Scripting • SQL Injection • Application Security • Security Prevention Controls • OWASP Top 10 • .Net Security • Java Security • PHP Security • Secure Coding Best Practices • OWASP Secure Coding Guidelines |
Cloud Computing Security | OWASP Top 10 • Windows Azure • RiskCloud Security Alliance • Best Practices • Amazon AWS • Cloud Computing Features |