دوراتنا

Network Security & Database Vulnerabilities

Network Security & Database Vulnerabilities

This course gives you the background needed to understand basic network security. You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization. You will learn the network components that guard an organization from cybersecurity attacks.\n\nIn addition to networking, you will learn about database vulnerabilities and the tools/knowledge needed to research a database vulnerability for a variety of databases including SQL Injection, Oracle, Mongo and Couch.

  • Course by
  • Self Paced
  • 15 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • AED 170.99 + VAT
اعرف المزيد
Software Security

Software Security

This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems.

  • Course by
  • Self Paced
  • 18 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • AED 170.99 + VAT
اعرف المزيد
Hacking and Patching

Hacking and Patching

In this MOOC, you will learn how to hack web apps with command injection vulnerabilities in a web site of your AWS Linux instance. You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future exploitation. You will learn how to patch these web apps with input validation using regular expression. You will learn a security design pattern to avoid introducing injection vulnerabilities by input validation and replacing generic system calls with specific function calls.

  • Course by
  • Self Paced
  • 15 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
VEGA for Beginners: Scan for Web Vulnerabilities

VEGA for Beginners: Scan for Web Vulnerabilities

This Guided Project 'VEGA for Beginners: Scan for Web Vulnerabilities' is for web developers, security professionals, and anyone who is interested in learning about web application security testing. In this 1 hour long project-based course, you will learn how to deploy and configure VEGA on Windows to scan for high, medium and low web vulnerabilities including SQL injection. You will learn how to use the VEGA scanner to identify SQL injection vulnerabilities in web applications, including how to configure and use the tool, and how to verify its results.

  • Course by
  • Self Paced
  • 3 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • Free
اعرف المزيد
Identifying Security Vulnerabilities

Identifying Security Vulnerabilities

This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. We'll learn the basics of applying cryptography, such as encryption and secure hashing. We'll learn how attackers can exploit application vulnerabilities through the improper handling user-controlled data.

  • Course by
  • Self Paced
  • 14 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Parametrize Queries to Protect Against Injections with Java

Parametrize Queries to Protect Against Injections with Java

By the end of this project you will be able to build a simple PostgreSQL database, we will interact with this simple database by creating a simple Java application that will use parameterized queries so as to prevent SQL injection attacks by using various well known methods that are widely used in the industry to protect against SQL injection attacks. This is an intermediate level project for developers and software engineers that work in the tech industry , who have an interest in further developing their knowledge of Java in software development and creating secure backend systems.

  • Course by
  • Self Paced
  • 3 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • Free
اعرف المزيد