CE 2003 : Security Application and Development

About This Course

Introduces best practices for securing applications, networks, and databases. Students learn how organizations protect assets from unauthorized access. Students start the initial phase of building applications while documenting security procedures.

These programs are not eligible for Federal Student Aid, military tuition assistance, VA funding or Learning Partner discounts.

Additional Course Information

This course is part of a four course Ethical Hacker Certificate program. Upon successful completion, with a 70% or higher, in each of the four courses, students need to complete the Certificate Request Form. A certificate of completion will be issued to the participating individual.

Courses can be taken separately from earning the certificate for CEU credit.

Course Outcomes

Upon completion of this course the student will be able to:

  • Identify the relationship between application security and system development.
  • Examine Structured Query Language (SQL) injection attacks.
  • Explain the best practices for securing an application and database.
  • Outline potential application security vulnerabilities.
  • Analyze the information technology (IT) physical security considerations for an organization.

Footnotes

  1. Students may request a course extension if the course is not completed within the allotted 10 week time frame. Extension options are available, with associated, non-refundable processing fees. Students who do not complete the course with a 70% or higher within the allotted 10 weeks and do not request a course extension will be removed from the course. Back to duration

Call to Actions Links