ID
7212

Intermediate HTML and CSS

Intermediate and advanced HTML and CSS, based on W3C latest standards, to create websites or web applications on the World Wide Web, including images, multimedia, tables, and forms. Cascading Style Sheets used to standardize the appearance of web pages. Introduction to JavaScript, XML and definition of server side technology.

XML and JSON

Introduction to eXtensible Markup Language (XML) and JavaScript Object Notation
(JSON). Hands-on experience with XML documents, Document Type Definition (DTD),
namespaces, schemas, and data presentation with eXtensible Style Language (XSLT) or
Cascading Style Sheets (CSS). Introduction to JSON syntax to store and exchange data.

Internet Basics and Beginning HTML

Methods of using the Internet. History, design and protocol methods used on Internet
including: electronic mail, connection to remote computers, file transfer, World Wide
Web, basic web page creation and publishing using HTML and CSS. Additional topics
include: computer security, copyright and electronic commerce, and basic Unix shell
commands requisite to shell account use.

Securing Web Applications

This course teaches techniques used by attackers to breach Web applications and how to prevent security attacks. Topics include how to secure and manage assets such as authentication systems, access controls, databases, and back-end components, and how to protect users from attackers, including identifying common vulnerabilities in compiled code and source code.

Hacking Mobile Devices

Mobile devices run specialized operating systems with security problems. Students will learn how mobile operating systems and apps work, how to find and exploit vulnerabilities and how to defend them. Topics will include phone call, voicemail, SMS intrusion, jailbreaking, rooting, NFC attacks, mal ware, browser exploitation, and application vulnerabilities.

Exploit Development

Learn how to find vulnerabilities and exploit them to gain control of target systems including operating systems. Covers essential exploit development skills for advanced penetration testers and security professionals. Students will be required to obey high
ethical principles and not exploit systems without authorization.