Skip to content

dthomsen116/SEC-260

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation

Certification of Authenticity:

I certify that this is entirely my own work, except where I have given fully-documented references to the work of others. I understand the definition and consequences of plagiarism and acknowledge that the assessor of this assignment may, for the purpose of assessing this assignment:

  • Reproduce this assignment and provide a copy to another member of academic
  • staff; and/or Communicate a copy of this assignment to a plagiarism checking
  • service (which may then retain a copy of this assignment on its database for
  • the purpose of future plagiarism checking)

Course Information

Course Name: Web and Applications Security

Course Number: SEC-260

Professor: Joe Eastman

Semester: Spring 2022

Student Name: David Thomsen

REPO Description

This course repository provides the work completed and assignments given during Web and Applications Security, taught by Professor Eastman. It includes essential information about the course, such as its description, objectives, and required materials. Please read through this document to familiarize yourself with the course content and expectations.

Course Description

Students will be introduced to the foundational technologies and security principles of web-based applications. This includes communication protocols, data formatting standards, client and server-side scripting, databases programming, and interactions within a tiered-application architecture. Students will gain a perspective on the importance of web applications in the modern enterprise with a focus on security threats, common vulnerabilities, and the practical application of security controls to mitigate those risks.

CLOs

Upon completion of the course, students will be able to:

  • Describe the components of a web system and the interaction of those components
  • Construct simple applications as prototypes or samples of larger systems
  • Learn where the evidence of attacks can be collected
  • Analyze connectivity and performance issues in web systems, isolate issues to component level, and select appropriate measures for resolution
  • Describe and analyze security issues in web systems
  • Describe and analyze the networking and web protocols involved in web systems
  • Analyze and design web system configurations in relation to the network infrastructure
  • Describe and discuss the critical role that web systems play in an organization, both internally and externally

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published