Module 1: OWASP Top 10 Application Security Risks
Module 2: Analysis of Web Application Security
In this module, you will learn how to perform series of web applications and web API penetration tests. Additionally, you will learn the most effective ways of securing them.
Module 3: Analysis of Android Application Security
This module focuses on mobile Android applications, its general design, security concepts and different approaches to penetration tests and security, especially independent from OS version.
Module 4: End to End solution testing
This module covers different methods of penetration testing of whole solutions regardless of technology used as development platform.
Module 5: Use cases and discussion
This module covers discussion about security solutions specific in different technologies. It also demonstrates practical and complete use case of penetration testing and solution in 'hands-on labs' environment.
COURSE CONTENT: Course Topics: • VSX Overview • Virtual System Installation and Configuration • VSX Clustering • Advanced VSX Features • Troubleshooting VSX Lab Exercises: • Configuring the VSX…
COURSE CONTENT: Chapter 1: Setting Up the BIG-IP System • Introducing the BIG-IP System • Initially Setting Up the BIG-IP System • Configuring the Management Interface • Activating the…
COURSE CONTENT: Module 1: Describe Cisco Umbrella • What is Umbrella • Enforcement • DNS Overview • Why DNS? • Co-occurrence Model • Spike Rank Model • Predictive IP…
We use cookies to improve your experience, including essential cookies required for the website to function. By continuing, you agree to our use of cookies. Learn more.