Student will learn various validation controls, mitigation techniques for validation control vulnerabilities, defensive techniques for SQL injection attacks, and output encoding to prevent input validation attacks.
Accessing this course requires a login. Please enter your credentials below!
Username or Email Address
Lost Your Password?
Don't have an account? Register one!
Register an Account