new.nexushuman.com
Home / Courses / Secure Web Applications / Seminar | Covering OWASP Top Ten, Web Services, Rich Interfaces & More (TT8120)

Secure Web Applications / Seminar | Covering OWASP Top Ten, Web Services, Rich Interfaces & More (TT8120)

Security experts agree that the least effective approach to security is ''penetrate and patch''. It is far more effective to ''bake'' security into an application throughout its lifecycle. After spending significant time examining a poorly designed (from a security perspective) web application, developers are ready to learn how to build...

  • 4.6 out of 5 rating
  • Last updated : 21/01/2026
  • English

Available as Instructor Led Training, Live Online & In Person at your Offices or Ours.

Duration:

16.00 hours

13.0 CPD hours

Overview:

Security experts agree that the least effective approach to security is ''penetrate and patch''. It is far more effective to ''bake'' security into an application throughout its lifecycle. After spending significant time examining a poorly designed (from a security perspective) web application, developers are ready to learn how to build secure web applications starting at project inception. The final portion of this course builds on the previously learned mechanics for building defenses by exploring how design and analysis can be used to build stronger applications from the beginning of the software lifecycle. The Secure Web Application Development Overview is geared for web developers and technical stakeholders who need to produce secure web applications, integrating security measures into the development process from requirements to deployment and maintenance. This overview-level course explores core concepts and challenges in web application security, showcasing current, real world examples that illustrate the potential consequences of not following these best practices. This course is also PCI Compliant.

Description:

Security experts agree that the least effective approach to security is ''penetrate and patch''. It is far more effective to ''bake'' security into an application throughout its lifecycle. After spending significant time examining a poorly designed (from a security perspective) web application, developers are ready to learn how to build secure web applications starting at project inception. The final portion of this course builds on the previously learned mechanics for building defenses by exploring how design and analysis can be used to build stronger applications from the beginning of the software lifecycle. The Secure Web Application Development Overview is geared for web developers and technical stakeholders who need to produce secure web applications, integrating security measures into the development process from requirements to deployment and maintenance. This overview-level course explores core concepts and challenges in web application security, showcasing current, real world examples that illustrate the potential consequences of not following these best practices. This course is also PCI Compliant.
DURATION 16.00 Hours

No upcoming local classes scheduled.

bg

Training Insurance Included!

When you organise training, we understand that there is a risk that some people may fall ill, become unavailable.

To mitigate the risk we include training insurance for each delegate enrolled on our public schedule, they are welcome to sit on the same Public class within 6 months at no charge, if the case arises.