Module 2: Planning for Web Application Security
This module explains the steps that are typically involved in the Web
application design process, what role security considerations play in each of
these steps, and finally, how these steps interrelate with one another. In this
module, students will focus on the threat analysis step in the design process by
identifying Web-accessible assets and the threats that are posed to those assets,
and by calculating the exposure of those assets to those threats. Finally, students
will learn about developing an implementation and maintenance plan for
securing Web applications....