Identity and Access Control for Modern Web Applications

Modern application design has changed quite a bit in recent years. “Mobile-first” and “cloud-ready” are the types of applications you are expected to develop. Additionally, Microsoft has revamped their web stack with OWIN, Katana, and ASP.NET Core to keep pace with these architectural demands.

Securing Java Web Services

Securing Java Web Services is a lab-intensive, hands-on JEE security training course, essential for experienced enterprise developers who need to produce secure JEE-based web services. In addition to teaching basic programming skills, this course digs deep into sound processes and practices that apply to the entire software development lifecycle.   Designing, implementing, and deploying secure…

Developing Secure Java Web Application Development – Lifecycle (SDLC)

Security experts agree that the least effective approach to security is "penetrate and patch". It is far more effective to "bake" security into an application throughout its lifecycle. Learn how the experts build security into their applications by walking through the entire development lifecycle of an application from a security perspective.

Developing Secure .NET Web Application Development – Lifecycle (SDLC)

Security experts agree that the least effective approach to security is "penetrate and patch". It is far more effective to "bake" security into an application throughout its lifecycle. Learn how the experts build security into their applications by walking through the entire development lifecycle of an application from a security perspective.

Developing Secure Java Web Applications

Security experts agree that the least effective approach to security is "penetrate and patch". It is far more effective to "bake" security into an application throughout its lifecycle. Learn how the experts build security into their applications by walking through the entire development lifecycle of an application from a security perspective.

Developing Secure .NET Web Applications

Security experts agree that the least effective approach to security is "penetrate and patch". It is far more effective to "bake" security into an application throughout its lifecycle. Learn how the experts build security into their applications by walking through the entire development lifecycle of an application from a security perspective.