Application Developers Role

Learn how to identify and assess application vulnerabilities

Next Steps:


    Upcoming Course Dates & Locations: View Schedule

    Type of Course: Classroom

    The majority of attacks targeting information come through applications. Hackers attempt to use applications to steal data and compromise business systems. This class provides the knowledge to think like an attacker and assess the security of an application before the attackers have a chance. In a classroom setting, instructors will teach you the skills needed through demonstration, labs, and lecture.

    What You'll Learn

    McAfee Foundstone consultants and instructors bring real-world experience to the classroom to empower you with the skills to assess your security posture and implement effective countermeasures. Foundstone experts bring their consulting experience of breaking into real enterprise networks and share their methodologies in the classroom.

    Key topics are supported by hands-on exercises and labs specifically designed to increase knowledge retention. This course will take you from theoretical knowledge to the all-important ability to “do it,” instead of just talk about it.

    Why We Teach This Course

    Applications are increasing a target of attacks. This class provides an overview of the history of application attacks and common application vulnerabilities. It also provides the knowledge of application development architecture.

    Who Teaches this Course

    Foundstone consultants and managers, who actively practice network penetration engagements on many of the world’s leading corporate, government, and military networks, bring real-world scenarios to the classroom. Collectively, they have performed hundreds of web and e-commerce security assessments, as well as managed security programs at Big Five consulting firms, the United States Air Force, and on Wall Street. Foundstone instructors authored the best-selling “Hacking Exposed: Network Security Secrets & Solutions,” one of the industry’s most popular and respected computer security guides.

    Who Should Take this Course

    This course is for system and network administrators, security personnel, auditors, consultants, and web designers concerned with web security. Basic Unix and Windows NT competency is required for this course to be fully beneficial.

    Continuing Education Credits

    This course qualifies for up to 24 hours of continuing professional education (CPE) credits for Certified Information Systems Security Professional (CISSP)/Systems Security Certified Practitioner (SSCP), and 21 hours of CPE credits for Certified Information Systems Auditor (CISA)/Certified Information Security Manager (CISM) holders.