Developers Trainings
Courses | Description |
---|---|
IIEH Secure Java Developer |
ESAPI Framework • OWASP Top 10 • Countermeasures in JAVA • J2EE Security • Application Security • Testing Methodologies • Struts • JAAS • Authentication & Authorization • Cryptography • Framework Security • OWASP Secure Code Guidelines • Secure Coding Best Practices |
IIEH Secure .NET Developer |
Cryptography • OWASP Top 10 • Countermeasures in .Net • Testing Methodologies • Role Based Security • Code – Access Security • Application Security • Authentication & Authorization • Framework Security • OWASP Secure Code Guidelines • Secure Coding Best Practices |
IIEH Secure PHP Developer |
Security in php.ini • OWASP Top 10 • Security in php.ini • Secure File Upload• Authentication & Authorization Issues • Code – Access Security • Application Security • Authentication & Authorization • Framework Security • OWASP Secure Code Guidelines • Secure Coding Best Practices |
IIEH Web Application Security Professional |
Threat Modeling • Cross-Site Scripting • SQL Injection • Application Security • Security Prevention Controls • OWASP Top 10 • .Net Security • Java Security • PHP Security • Secure Coding Best Practices • OWASP Secure Coding Guidelines |
Cloud Computing Security |
OWASP Top 10 • Windows Azure • RiskCloud Security Alliance • Best Practices • Amazon AWS • Cloud Computing Features |