Application Developers Role

Learn how to identify and assess application vulnerabilities

Next Steps:

Overview

Upcoming Course Dates & Locations: View Schedule

Type of Course: Classroom

The majority of attacks targeting information come through applications. Hackers attempt to use applications to steal data and compromise business systems. This class provides the knowledge to think like an attacker and assess the security of an application before the attackers have a chance. In a classroom setting, instructors will teach you the skills needed through demonstration, labs, and lecture.

What You'll Learn

McAfee Foundstone consultants and instructors bring real-world experience to the classroom to empower you with the skills to assess your security posture and implement effective countermeasures. Foundstone experts bring their consulting experience of breaking into real enterprise networks and share their methodologies in the classroom.

Key topics are supported by hands-on exercises and labs specifically designed to increase knowledge retention. This course will take you from theoretical knowledge to the all-important ability to “do it,” instead of just talk about it.

Why We Teach This Course

Applications are increasing a target of attacks. This class provides an overview of the history of application attacks and common application vulnerabilities. It also provides the knowledge of application development architecture.

Who Teaches this Course

Foundstone consultants and managers, who actively practice network penetration engagements on many of the world’s leading corporate, government, and military networks, bring real-world scenarios to the classroom. Collectively, they have performed hundreds of web and e-commerce security assessments, as well as managed security programs at Big Five consulting firms, the United States Air Force, and on Wall Street. Foundstone instructors authored the best-selling “Hacking Exposed: Network Security Secrets & Solutions,” one of the industry’s most popular and respected computer security guides.

Who Should Take this Course

This course is for system and network administrators, security personnel, auditors, consultants, and web designers concerned with web security. Basic Unix and Windows NT competency is required for this course to be fully beneficial.

Continuing Education Credits

This course qualifies for up to 24 hours of continuing professional education (CPE) credits for Certified Information Systems Security Professional (CISSP)/Systems Security Certified Practitioner (SSCP), and 21 hours of CPE credits for Certified Information Systems Auditor (CISA)/Certified Information Security Manager (CISM) holders.