Securing Web Applications, Services and Servers Online Training

  • Time

    10:00am - 3:00pm

  • End Date

    22 Aug, 2022 - 24 Aug, 2022

  • Price

    ₦200,000

Event Details

Securing Web Applications, Services and Servers workshop exposes participants to skills, industry best practices and technology for mitigating and eliminating either internal or external security threats within their business’ private and/or public cloud infrastructure

CONTENT

Network Security and Firewalls

  • Establishing Security Fundamentals
  • Significance of network security, and identify various elements of an effective security policy, including risk factors, security-related organizations, key resources to secure, general security threat types, access control
  • Encryption and the encryption methods used in internetworking
  • Guidelines and principles of effective network security to create effective specific solutions
  • Apply security principles and identify security attacks
  • Identify firewall types and define common firewall terminology
  • Plan a firewall system that incorporates multiple levels of protection, including firewall system design, proactive detection, setting traps, security breach response, security alerting organizations

Securing Web and Network Services

  • Modeling web security
  • Configure a web server to encrypt web traffic with HTTPS
  • Configuring security for HTTP services
  • Securing XML Web Services
  • Securing communication with SSL/TLS
  • Securing database - application interaction

Security Testing of Web Applications and Services

  • Testing security of web applications on organization’s network
  • Identify, diagnose and correct the serious web application vulnerabilities
  • Creating a trust boundary with proper input validation
  • Avoiding cross-site scripting vulnerabilities
  • Implementing URL access restrictions

Implementing Data Protection

  • Encrypting and hashing
  • Hardening
  • Augmenting web server security
  • Detecting and mitigating unauthorized file-system modification
  • Detecting and mitigating unauthorized modification of content

Using Security Best Practices

  • Implementing Web Application Security
  • Employing OWASP resources

 

FOR WHOM:      CIOs, IT Development Managers, Heads of Department, System Administrators/Engineers, IT Professionals and others who want to sharpen their knowledge in IT world.

 

TRAINING METHODOLOGY

The training methodology combines lectures, discussions, group exercises and illustrations. Participants will gain both theoretical and practical knowledge of the topics. The emphasis is on the practical application of the topics and as a result participant will go back to the workplace with both the ability and the confidence to apply the techniques learned to their duties.

 

DATE:

1ST BATCH: 21st – 23rd Feb, 2022                            

2ND BATCH: 22nd – 24th Aug, 2022  

Other Dates

Start Date End Date
10 Sep, 2019 13 Sep, 2019
Start Date End Date
19 Mar, 2019 22 Mar, 2019
Start Date End Date
05 May, 2021 07 May, 2021
Start Date End Date
01 Nov, 2021 03 Nov, 2021
Start Date End Date
22 Aug, 2022 24 Aug, 2022

Share this course