Certified Ethical Hacking

Certified Ethical Hacking

CEH is a paradigm that involves techniques like information gathering, finding vulnerabilities(loopholes) in a web application or website and exploiting those vulnerabilities to successfully compromise. Typically in web application security, penetration testing is commonly used to augment a Web Application Firewall(WAF). Doing such penetration testing on the web application will help the business and organization to protect their confidential information from external threats or cyber-attacks.

The Open Web Application Security Project (OWASP) is a community that focuses its efforts solely on discovering and reporting web application security vulnerabilities. Their reputable list of top 10 security flaws is updated every year to reflect the global trends in the security of web applications. OWASP also publishes articles and security tools that are most practised.


Log Analysis

Who can attend ?

"Secure coding is the practice of developing computer software in a way that guards against the accidental introduction of security vulnerabilities. Defects, bugs and logic flaws are consistently the primary cause of commonly exploited software vulnerabilities".

Simply, secure coding is the practice of writing software that's protected from vulnerabilities without leaving a loop hole for a attacker.

By identifying the insecure coding practices that lead to these errors, we educate developers of the organization on secure alternatives to take proactive steps to help significantly reduce or eliminate vulnerabilities in software before deployment.

Prerequisites for this course

Code Review is an integral process of software development that helps identify bugs and defects before the testing phase. Code review is often overlooked as an ongoing practice during the development phase, but countless studies show it's the most effective quality assurance strategy.

Our code review process will look at:
Design - Is the code well-designed and appropriate for your system?
Functionality - Does the code behave as the author likely intended?
Complexity - Could the code be made simpler?
Tests - Does the code have correct and well-designed automated tests?
Naming - Did developer choose clear names for variables, classes, etc.?
Comments - Are the comments clear and useful?
Style - Does the code follow our style guides?
Documentation - Did developer also update relevant documentation?

Log Analysis
Log Analysis

Objectives of this course

"Secure coding is the practice of developing computer software in a way that guards against the accidental introduction of security vulnerabilities. Defects, bugs and logic flaws are consistently the primary cause of commonly exploited software vulnerabilities".

Simply, secure coding is the practice of writing software that's protected from vulnerabilities without leaving a loop hole for a attacker.

By identifying the insecure coding practices that lead to these errors, we educate developers of the organization on secure alternatives to take proactive steps to help significantly reduce or eliminate vulnerabilities in software before deployment.