What Will I Learn?

  • Define application security

  • Understand the importance of application security

  • Familiarize with the OWASP standard, methodology and structure

  • Explore OWASP various applications

  • Learn how to scan an application for vulnerabilities and perform threat modeling

  • Gain in-depth information about several practices, theories, and concepts for keeping a secure environment

  • Master correcting common security vulnerabilities in code

Course Details

  • Language

    Course is delivered in Arabic language with English presentations

  • Course Level

    Intermediate level - Fair knowledge of IT concepts

  • Duration

    Estimated 3.5 hours to complete course

  • Course Nature

    The course consists of 54 videos.

  • Course Availability

    The course will be available for 90 days from enrollment date.

  • Certificate of Completion

    Shareable certificate of completion

COURSE SUMMARY

    1. Agenda

      FREE PREVIEW
    2. Definition - Part 1

    3. Definition - Part 2

    4. Importance of Application Security - Part 1

    5. Importance of Application Security - Part 2

    1. OWASP Standard

      FREE PREVIEW
    2. Methodology and Structure

    1. A01 Broken Access Control - Definition, Weakness and Prevention

    2. A01 Broken Access Control - Scenario

    3. A02 Cryptographic Failures - Definition

    4. A02 Cryptographic Failures - Weakness and Prevention

    5. A02 Cryptographic Failures - Scenario

    1. A03 Injection - Definition

    2. A03 Injection - Weakness and Prevention

    3. A03 Injection - Scenario #1

    4. A03 Injection - Scenario #2

    5. A04 Insecure Design - Definition

    6. A04 Insecure Design - Weakness and Prevention

    7. A04 Insecure Design - Scenario

    1. A05 Security Misconfiguration - Definition

    2. A05 Security Misconfiguration - Weakness and Prevention

    3. A05 Security Misconfiguration - Scenario

    4. A06 Vulnerable and Outdated Components - Definition

    5. A06 Vulnerable and Outdated Components - Weakness and Prevention

    6. A06 Vulnerable and Outdated Components - Scenario

    1. A07 Identification and Authentication Failures - Definition

    2. A07 Identification and Authentication Failures - Weakness and Prevention

    3. A07 Identification and Authentication Failures - Scenario #1

    4. A07 Identification and Authentication Failures - Scenario #2

    5. A07 Identification and Authentication Failures - Scenario #3

    6. A07 Identification and Authentication Failures - Scenario #4

About this course

  • $350.00
  • 55 lessons
  • 3.5 hours of video content

What others have said about this course

5 star rating

دورة ثمينة

Ahmad Yehya

. معلومات غزيرة وقدرة هائلة على جمع هذا الكم الهائل والموجز من هذا العلم المثير ووضعه في كبسولات نافعة ومختصرة شكرا لادارة IKG على هذه الفرصة العلمية ...

Read More

. معلومات غزيرة وقدرة هائلة على جمع هذا الكم الهائل والموجز من هذا العلم المثير ووضعه في كبسولات نافعة ومختصرة شكرا لادارة IKG على هذه الفرصة العلمية المثبرة وهذه الرحلة الممتعة

Read Less
5 star rating

A comprehensive and practical course on application security

"Muhammad at-Tayieb" Al-Hyari

I enjoyed this course so much. It covers all the topics related to application security in a clear and engaging way. The instructor (whom I know in person) e...

Read More

I enjoyed this course so much. It covers all the topics related to application security in a clear and engaging way. The instructor (whom I know in person) explains the concepts and examples with real-world scenarios and demonstrations. The course provides useful information on popular technologies, certificates, career paths, skills and links for further learning. I learned a lot from this course, and I highly recommend it to anyone who wants to improve his/her application security skills.

Read Less
5 star rating

Feedback

Hamza Abbas

Thanks for all the efforts you put in to walk me through this. Very thorough, informative and well organized.

Thanks for all the efforts you put in to walk me through this. Very thorough, informative and well organized.

Read Less
5 star rating

Application Security Course Review

Salah ALDeen Abedalhaq

Application security is necessary today, and this course provides the necessary information about every possible attack and the right ways to deal with it. ...

Read More

Application security is necessary today, and this course provides the necessary information about every possible attack and the right ways to deal with it. This course was great, I learned many things that I had never heard of before. The course has been presented in an easy way, anyone can understand everything in a short time. I recommend this course to everyone who is interested in security in web applications.

Read Less
5 star rating

Application Security Course Review

Anas taan

I found it highly beneficial. The professor was exceptionally skilled at simplifying complex security concepts, making them easy to understand. The course ma...

Read More

I found it highly beneficial. The professor was exceptionally skilled at simplifying complex security concepts, making them easy to understand. The course material was well-structured, covering all the basics you need to understand application security.

Read Less

Requirements and Prerequisites

  • Internet Speed

    Since the course is based on multiple videos, a reasonable Internet speed is required to allow for continuous viewing

  • Laptop or Mobile

    Course can be viewed from either a laptop or a mobile.

  • IT Concepts

    Adequate understanding of IT concepts since the course is considered Intermediate Level