{"id":5900,"date":"2022-11-29T08:44:13","date_gmt":"2022-11-29T07:44:13","guid":{"rendered":"https:\/\/republify.se\/?post_type=product&#038;p=5900"},"modified":"2026-01-09T08:46:49","modified_gmt":"2026-01-09T07:46:49","slug":"web-security-fundamentals","status":"publish","type":"product","link":"https:\/\/republify.se\/index.php\/produkt\/web-security-fundamentals\/","title":{"rendered":"Web security for developers"},"content":{"rendered":"<p>Today\u2019s internet is a very rough place, with robots, spies, states, hackers, and other evil entities constantly roaming around the web looking for vulnerable web applications to attack. Because of this, it is very important that every developer has the necessary skills to protect their applications.<\/p>\n<div class=\"elementor-element elementor-element-778d15c7 elementor-widget elementor-widget-heading\" data-id=\"778d15c7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Target audience<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9b48b31 elementor-widget elementor-widget-text-editor\" data-id=\"9b48b31\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>This course targets developers on all platforms including .NET, Java, and PHP.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6cc450c5 elementor-widget elementor-widget-heading\" data-id=\"6cc450c5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Prerequisites<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3d9b49a3 elementor-widget elementor-widget-text-editor\" data-id=\"3d9b49a3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>You should have basic web development experience including HTML, CSS and JavaScript.<\/p>\n<div class=\"elementor-element elementor-element-14a49e8f elementor-widget elementor-widget-heading\" data-id=\"14a49e8f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Agenda<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3c468123 elementor-widget elementor-widget-text-editor\" data-id=\"3c468123\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>In this course we will cover concepts like:<\/p>\n<ul>\n<li>Social Engineering<\/li>\n<li>Securing HTTPS<\/li>\n<li>Unicode<\/li>\n<li>Cross Site Scripting (XSS)<\/li>\n<li>Preventing XSS with Content Security Policy (CSP)<\/li>\n<li>Cross site request forgery (CSRF)<\/li>\n<li>Securing your cookies<\/li>\n<li>Same site cookies<\/li>\n<li>Cross-Origin Resource Sharing (CORS)<\/li>\n<li>SQL Injections<\/li>\n<li>Authentication<\/li>\n<li>Application DoS attacks<\/li>\n<li>Securing passwords<\/li>\n<li>Preventing data leaks<\/li>\n<li>Intercepting proxies<\/li>\n<li>Supply-chain attacks<\/li>\n<li>Subresource Integrity<\/li>\n<\/ul>\n<p>And much more\u2026<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h3>Kursen levereras i samarbete med<\/h3>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-1629 lazyload\" data-src=\"https:\/\/republify.se\/wp-content\/uploads\/2022\/02\/TN.jpg\" alt=\"\" width=\"259\" height=\"44\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 259px; --smush-placeholder-aspect-ratio: 259\/44;\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this hands-on course you will learn the fundamentals of how the web works, how to protect your applications and how attacks are performed. It goes beyond the OWASP TOP-10 and gives you many concrete examples of how to fail and how to protect your applications.<\/p>\n<p>This course is constantly improved as new security vulnerabilities and best practices emerge.<\/p>\n","protected":false},"featured_media":2151,"comment_status":"open","ping_status":"closed","template":"","meta":{"wds_primary_product_brand":0,"wds_primary_product_cat":0},"product_brand":[],"product_cat":[57,31,39],"product_tag":[],"class_list":{"0":"post-5900","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-secure-coding","7":"product_cat-security","8":"product_cat-systemutveckling","10":"first","11":"instock","12":"taxable","13":"shipping-taxable","14":"purchasable","15":"product-type-simple"},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/product\/5900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/comments?post=5900"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/media\/2151"}],"wp:attachment":[{"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/media?parent=5900"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/product_brand?post=5900"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/product_cat?post=5900"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/republify.se\/index.php\/wp-json\/wp\/v2\/product_tag?post=5900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}