Posts

Showing posts with the label WEB APPLICATION

Learn HTML5 Programming By Building Projects

Image
Learn HTML5 Programming By Building Projects About this Course In order to master a technique in web development or any artistic field, the best approach is one that's hands-on. This allows you to not only learn concepts, but also apply them right away to build your own projects from scratch. That's why this course guides you through the process of actually creating a variety of games, apps, and sites using HTML5 and JavaScript. Master HTML5 and JavaScript, starting with the creation of 10 apps and games. •  HTML5 and JavaScript, Including Semantic Markup and Boilerplate Framework •  CSS3 Media Queries and Responsive Design •  JQuery, Fancybox, APIs, and More •  10 Hands-On Projects, Including Games and Apps Use HTML5 and JavaScript to Create a Variety of Projects Not all sites and apps use HTML5 yet, but the ones that do are advanced and cutting edge, and this is the way of the future in web design and app development. Using HTML5, CSS3, JavaScript, and other tools

Web Application Security for Absolute Beginners (no coding!)

Image
Web Application Security for Absolute Beginners (no coding!) Description [UPDATED in 2021] Within  1,5 hour  you will understand web application security without having to code. This course will  jumpstart your security career .  I will teach you the 10 most common threats identified by the Open Web Application Security Project (OWASP). At the end of the course you will learn:    1) what the OWASP top 10 threats and are, 2) the impact per security threat for your business  3) how these security threats can be executed by attackers / pentesters / hackers 4) how these security threats can be mitigated  You will able to understand the above-mentioned points without having to understand code... For your convenience I've combined the OWASP 2017 and OWASP 2013 top 10 list into a single list of 10 common web application security threats. How is that possible? The threats are explained conceptually, since the implementation of a threat may differ per situation. Therefore, havin