Top 10 security issues and solutions - part 3 (CYRUS) Created byGalina MISHEVA|Updated29 April 2025OnlineWriting secure web applications can be challenging for various reasons, from dealing with legacy technologies and under-documented third-party components to tight deadlines and code maintainability. But what if attackers are actively trying to breach your code right now? How vulnerable is your system to these threats?BackgroundThis course will change the way you look at your code by teaching you to identify common weaknesses and their potential consequences, which hackers can exploit to attack your system. More importantly, you’ll learn best practices to protect yourself and your applications.About this courseThe course covers typical web vulnerabilities, focusing on how they impact applications across the entire stack—starting from the base environment to modern AJAX and HTML5-based frontends. The course also delves into security concerns specific to different platforms and highlights common programming mistakes to avoid. Through live practical exercises, you will gain hands-on experience that will keep you engaged while learning to write more secure code.Writing secure code gives you a distinct advantage over your competitors and helps protect against cybercrime. The course covers the first two issues of the OWASP Top 10: Security misconfiguration, broken access control and cryptographic failures, providing you with the knowledge to safeguard your web applications effectively.Learning outcomesBy completing this training, you will:Understand basic concepts of security, IT security and secure coding practicesIdentify web vulnerabilities beyond the OWASP Top 10 and learn methods to mitigate themLearn about XML securityUnderstand client-side vulnerabilities and apply secure coding practices to prevent themRecognise typical coding mistakes and strategies to avoid themGain insights into recent vulnerabilities in the Java frameworkAccess additional resources and readings on secure coding practices to continue learningFurther detailsThe training is free of charge and offered as self-paced e-learning available on demand (duration: approximately 2.5 hours) from April 2025 to October 2025.To move forward in this e-learning course, watch each video completely before starting the next lesson. The system is designed to track your progress and will only unlock the subsequent lessons once the current video has been completely viewed. Additionally, after completing each lesson, you must manually mark it as completed to confirm your understanding and maintain an organised learning flow. These steps are crucial for ensuring a seamless and effective learning experience.Explore the "Top 10 security issues and solutions - part 3 (CYRUS)" via here!Training Offer DetailsWebsite linkTop 10 security issues and solutions - part 3 (CYRUS)CYRUS project pageDigital technology / specialisationSoftwareWeb DevelopmentTraining opportunitiesCourseLearning EffortPart time lightSelf-pacedYesDuration Time4 WeeksDigital skill levelIntermediateAdvancedProvider OrganisationDEEP BLUE S.R.LGeographic scope - CountryAustriaBelgiumBulgariaCyprusRomaniaSloveniaCroatiaCzech republicDenmarkEstoniaFinlandFranceGermanyGreeceHungaryItalyIrelandMaltaLatviaLithuaniaLuxembourgNetherlandsPortugalPolandSwedenSpainSlovakiaShow moreShow lessTarget languageEnglishField of education and trainingInformation and Communication Technologies (ICTs) not further definedEngineering, manufacturing and construction not further definedEngineering and engineering trades not further definedIs this course freeYesCredential offeredGenericPrerequisitesNoUpcoming courseNo Share this page Log in to comment