The main objective of this course is to know and understand the basic methods, techniques and IT tools used to detect threats and attacks on web applications and services. After completing this course, a student can analyze web applications in the context of security, identify their vulnerabilities for attacks and conduct experiments to simulate them.
LECTURES
- Protected: Lecture plan, conditions to pass a course (PDF, 1.1 MB)
- Protected: Lecture1 – part I (PDF, 3.2 MB)
- Protected: Lecture1 – part II (PDF, 10.7 MB)
- Protected: Lecture2 – part I (PDF, 3.0 MB)
- Protected: Lecture2 – part II (PDF, 4.2 MB)
- Protected: Lecture3 (PDF, 3.5 MB)
- Protected: Lecture4 – part I (PDF, 2.8 MB)
- Protected: Lecture4 – part II (PDF, 2.7 MB)
- Protected: Lecture5 – part I (PDF, 2.9 MB)
- Protected: Lecture5 – part II (PDF, 3.2 MB)
- Protected: Lecture6 (PDF, 3.1 MB)
LABORATORY CLASSES
No downloads found.