Gear and Menu Labeled Collect and Operate Padlock labeled Securely Provision Hammer and Wrench labeled Operate and Maintain Shield labeled Protect and Defend

Ethical Hacking: Designing secure, functional, and compliant software.

  • Understand the most prevalent web application vulnerabilities.
  • Understand the process of mitigation.
  • Explain OWASP vulnerabilities, and how to protect against their exploitation.
  • Understand programming best practices to prevent security vulnerabilities.
  • Understand the ethical hack process.
NICE Framework Connections