(*)Students can:
- Recognize and analyze the most common kinds of attacks against web applications and evaluate their danger (K5)
- Analyze where a specific type of attack might be possible in a web application (K4) and implement a suitable countermeasure (K6)
- Apply general countermeasures during software development (K3)
- Test web applications against selected vulnerabilities (K3)
|
(*)- Types of attacks (such as SQL injections, cross-site scripting, cross-site request forgery, session stealing/fixation etc)
- Specific countermeasures for these attacks
- General methods of securing web applications (e.g. input validation, indirections)
- Examples of attacks (how they occurred) and how to perform them (testing for vulnerabilities)
- How to recognize such attacks, i.e. typical patterns for these types of attacks
|