Introduces best practices for securing applications, networks, and databases. Students learn how organizations protect assets from unauthorized access. Students start the initial phase of building applications while documenting security procedures.
These programs are not eligible for Federal Student Aid, military tuition assistance, VA funding or Learning Partner discounts.
Additional Course Information
This course is part of a four course Ethical Hacker Certificate program. Upon successful completion, with a 70% or higher, in each of the four courses, students need to complete the Certificate Request Form. A certificate of completion will be issued to the participating individual.
Courses can be taken separately from earning the certificate for CEU credit.
Course Outcomes
Upon completion of this course the student will be able to:
- Identify the relationship between application security and system development.
- Examine Structured Query Language (SQL) injection attacks.
- Explain the best practices for securing an application and database.
- Outline potential application security vulnerabilities.
- Analyze the information technology (IT) physical security considerations for an organization.