• Online, Self-Paced
Course Description

Discover how common threat sources actually get exploited, in the world of web security. During this course, you will learn about white hat hackers, social engineers, phishing, social engineering attempts, exploit kits, ransomware, state sponsored hacking, and bug bounties. See how web-based applications have become more popular and what popularity means for data security. Look at Web Application Firewalls (WAFs), and how they protect web applications.

Learning Objectives

Knowledge of system vulnerabilities

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):