After the course, students can:
- explain what the standard security problems in web-applications are (such as SQL-injection, XSS, CSRF, etc.) and how these work;
- explain which countermeasures there are against these weaknesses, explain how these work, and apply some of these;
- find and exploit such weaknesses in simple web-applications.
|
|
Most cyber security problems have their origin in software, and esp. software that operates via the internet. This course is about security vulnerabilities in web applications. It covers standard types of security vulnerabilities, how they can be exploited, what the underlying root causes are, and what can be done to prevent them, detect them, or mitigate their impact.
|
|
|
Databases (IPC024) and Security (IPC021) |
|
Mandatory project work and written exam |
|
|