The main objective of this course is to know and understand the basic methods, techniques and IT tools used to detect threats and attacks on web applications and services. After completing this course, a student can analyze web applications in the context of security, identify their vulnerabilities for attacks and conduct experiments to simulate them.
LECTURES
- Protected: Lecture1 (PDF, 3.1 MB)
- Protected: Lecture2 (PDF, 9.7 MB)
- Protected: Lecture3 (PDF, 3.1 MB)
- Protected: Lecture4 (PDF, 4.1 MB)
- Protected: Lecture5 (PDF, 3.4 MB)
- Protected: Lecture6 (PDF, 2.9 MB)
- Protected: Lecture7 (PDF, 2.7 MB)
- Protected: Lecture8 (PDF, 3.0 MB)
- Protected: Lecture9 (PDF, 3.2 MB)
- Protected: Lecture10 (PDF, 3.2 MB)