O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Certified Secure Web Application Engineer (CSWAE)

Video Description

The Certified Secure Web Application Engineer (CSWAE) preparatory course is a comprehensive course covering all of the exam topics of the CSWAE certification offered by Mile2. The course helps the students to understand the technologies that are being used under the hood so that they are able to make informed decisions when choosing a cloud vendor. The course also covers the different types of cloud products, their working, their benefits and the migration process to the cloud. The Certified Secure Web Application Engineer (CSWAE) course enables the students to establish industry acceptable auditing standards with current best practices and policies specifically for the web applications and cloud environment. The students are able to learn, implement and test the concepts taught in this course in real-world scenarios. The course is also very helpful for students who are looking forward to appear in and clear the CSWAE certification exam by Mile2. NOTE Mile2 is: ACCREDITED by the NSA CNSS 4011-4016 MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

Table of Contents

  1. Web Application Security
    1. Web Application Security Part1 00:18:41
    2. Web Application Security Part2 00:18:36
    3. Web Application Security Part3 00:19:32
    4. Web Application Security Part4 00:18:33
    5. Web Application Security Part5 00:05:03
  2. Secure SDLC
    1. Secure SDLC Part1 00:07:45
    2. Secure SDLC Part2 00:08:29
    3. Secure SDLC Part3 00:09:21
  3. OWASP TOP 10
    1. OWASP TOP 10 Part1 00:08:11
    2. OWASP TOP 10 Part2 00:07:22
    3. OWASP TOP 10 Part3 00:12:18
  4. Risk Management
    1. Risk Management Part1 00:08:22
    2. Risk Management Part2 00:09:24
    3. Risk Management Part3 00:08:11
    4. Risk Management Part4 00:08:07
  5. Threat Modeling
    1. Threat Modeling 00:17:45
  6. Authentication and Authorization Attacks
    1. Authentication and Authorization Attacks Part1 00:05:16
    2. Authentication and Authorization Attacks Part2 00:04:40
    3. Authentication and Authorization Attacks Part3 00:04:21
    4. Authentication and Authorization Attacks Part4 00:04:37
    5. Authentication and Authorization Attacks Part5 00:04:46
  7. Session Management
    1. Session Management 00:10:06
  8. Security Architecture
    1. Security Architecture Part1 00:09:01
    2. Security Architecture Part2 00:10:01
    3. Security Architecture Part3 00:10:20
  9. Input Validation and Data Sanitization
    1. Input Validation and Data Sanitization Part1 00:05:40
    2. Input Validation and Data Sanitization Part2 00:06:25
    3. Input Validation and Data Sanitization Part3 00:06:36
    4. Input Validation and Data Sanitization Part4 00:05:36
  10. AJAX Security
    1. AJAX Security 00:05:13
  11. Insecurity Code Discovery and Mitigation
    1. Insecurity Code Discovery and Mitigation Part1 00:18:58
    2. Insecurity Code Discovery and Mitigation Part2 00:20:07
  12. Application Mapping
    1. Application Mapping 00:06:51
  13. Cryptography
    1. Cryptography Part1 00:14:01
    2. Cryptography Part2 00:14:10
  14. Testing Methodologies
    1. Testing Methodologies Part1 00:19:31
    2. Testing Methodologies Part2 00:11:07