Course Justification Industry advisors have repeatedly asked us to teach this class, because every modern business needs a web presence and there are far too few workers qualified to protect them from hackers. There are many jobs available for students who learn how to protect our healthcare, financial, and other confidential data from criminals, spies, and pranksters. Catalog Description Techniques used by attackers to breach Web applications, and how to protect them. How to secure authentication, access, databases, and back-end components. How to protect users from each other. How to find common vulnerabilities in compiled code and source code.



Advisory: CNIT 131 and CNIT 120, or comparable familiarity with websites and security concepts Major Learning Outcomes Upon successful completion of this course, the student will be able to: Explain the current state of Web application security Analyze basic application functionality Secure data stores and back-end components Protect users from other users Demonstrate common exploits and patch their root causes Implement servers and firewalls effectively Textbook "The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2nd Edition", by Dafydd Stuttard , Marcus Pinto; ISBN-10: 1118026470 Buy from Amazon

