- Architecture of web-based applications and security best practices
- Authentication and authorization for accessing applications
- Managing common security vulnerabilities, security of data at rest and in transit.
- Understand how attackers are able to compromise applications.
- Learn future application security trends and security measures to build defensible applications.
- Understand how web based applications are architected and best practices to defend these applications.
- Implement secure software development life cycle methodologies.
- Secure software products purchased from third parties.