CONTENT
1. The Importance of Security
1.1. Software Development Life Cycle
1.2. Introduction to Programming Language
1.3. Introduction to Computer Security
1.4. Kinds of Attacks to Web Application Vulnerable
2. Practicing Secure Programming
2.1. Validating and Sanitizing User Input
2.2. Preventing SQL Injection
2.3. Preventing Cross-Site Scripting (XSS)
2.4. Enforcing Session Hijacking
2.5. Preventing Remote Execution
3. Practicing Secure Operations
3.1. Using CAPTHAs
3.2. User Authentication, Authorization, and Logging
3.3. Preventing Data Loss
4. Creating a Safe Environment
4.1. Securing Unix
4.2. Securing Database
4.3. Using Encryption
4.4. Securing Network Connection: SSL and SSH