Developers Trainings

CoursesDescription
IIEH Secure Java Developer
ESAPI Framework • OWASP Top 10
• Countermeasures in JAVA • J2EE Security • Application Security • Testing Methodologies
• Struts • JAAS • Authentication & Authorization • Cryptography • Framework Security • OWASP Secure Code Guidelines
• Secure Coding Best Practices

IIEH Secure .NET Developer
Cryptography • OWASP Top 10
• Countermeasures in .Net • Testing Methodologies • Role Based Security • Code - Access Security • Application Security
• Authentication & Authorization • Framework Security • OWASP Secure Code Guidelines • Secure Coding Best Practices

IIEH Secure PHP Developer
Security in php.ini • OWASP Top 10
• Security in php.ini • Secure File Upload• Authentication & Authorization Issues • Code - Access Security • Application Security
• Authentication & Authorization • Framework Security • OWASP Secure Code Guidelines • Secure Coding Best Practices

IIEH Web Application Security Professional
Threat Modeling • Cross-Site Scripting
• SQL Injection • Application Security • Security Prevention Controls • OWASP Top 10 • .Net Security
• Java Security • PHP Security • Secure Coding Best Practices • OWASP Secure Coding Guidelines

Cloud Computing Security
OWASP Top 10 • Windows Azure
• RiskCloud Security Alliance • Best Practices • Amazon AWS • Cloud Computing Features