Skip to main content

Web Application Security (online)

This course is only available as a bespoke programme for companies and organisations. Please contact us to discuss your requirements.

This 5-week CPD training course is open for all software developers interested in improving their knowledge and practical skills in cyber security. In the course, we introduce participants to the key concepts of cyber security and discuss the importance of security in web applications.

The course will provide an overview of security vulnerabilities in web application and teach how to choose and implement appropriate security countermeasures. The course will provide practical, hands-on experience of conducting web application penetration testing and implementing a wide range of security countermeasures in web applications.

No upcoming dates available

There are currently no upcoming dates available for this course, but you can . We will be in touch when a new course date is scheduled.

Something went wrong

Your query has not been submitted. Get in touch by emailing or phoning us on +44 (0)29 2087 5274.

This field is required. Please enter a first name.
This field is required. Please enter a last name.
This field is required. Please enter an email.
Would you like to receive occasional updates regarding this course and other CPD news, events and offers?

Data protection privacy notice

Cardiff University will process the personal data you provide to us in accordance with data protection regulations. In submitting your details you consent to the University processing your personal data in order to send you information, in accordance with the preferences you have indicated above. You may withdraw this consent at any time by contacting the Professional Development team.

Visit our public information pages to learn more about our Data Protection Policy, your rights, and raising a concern about how your personal data is processed. Our Data Protection Officer can be contacted directly at Concerns can also be raised with the Information Commissioner's Office (ICO).

Thank you

You have successfully registered your interest in this course. We will be in touch if new dates become available.

Who it’s for

The course is designed for software developers and web application developers, computer scientists and IT experts who are interested in improving their web application security knowledge and skills.

Pre-requisite knowledge and technical requirements

A participant must have Java programming experience, and knowledge of SQL databases. The knowledge of the Spring framework is beneficial.

A participant will require an access to an Internet-connected computer for the duration of the course. All software used in this module is open source. A list of required software includes IntelliJ IDEA (community edition) or another Java IDE, MySQL Server or MariaDB, and MySQL Workbench. Further information about required tools will be provided closer to the start date.

What you’ll learn

On successful completion of the course a participant will be able to:

  • use key security terminology associated with the topics covered
  • choose (with justification) an appropriate security countermeasure(s)
  • secure data in transit and at rest
  • implement authentication and authorisation in a web application
  • prevent CSRF, XSS and SQL injection attacks
  • prevent information leakage, and direct object reference vulnerabilities
  • secure a database system
  • penetration test web applications
  • write a penetration test report

Topics covered

  • cyber security key concepts and terminology
  • encryption and hashing, and its applications
  • OWASP Top Ten
  • common web application vulnerabilities and countermeasures
    • effective logging and monitoring
    • prevention of information leakage
    • user input validation
    • authentication and authorization
    • insecure direct object reference vulnerability
    • injection vulnerabilities, including SQL injection
    • CSRF
    • XSS
    • encryption in transit and at rest
    • API security
    • database systems security
  • penetration testing procedure and tools

How will the course be delivered?

This is a 5-week course which consists of weekly live sessions and asynchronous learning activities.  Suggested weekly time commitment is 5-7 hours, including 2 hours of live sessions and 3-5 hours of guided study following provided material and tutorials.

The asynchronous learning activities will be made available online for participants to complete in their own time ahead of the weekly live sessions, which are offered face-to-face at Cardiff University or alternatively participants can attend remotely, via Teams.

Live sessions will take place on Thursdays 2-4 pm, starting Thursday 9 June 2022 and running for five consecutive weeks. The live sessions will include practical demonstrations of the vulnerabilities and countermeasures taught, as well as group discussions and Q&A/help sessions.

The online forum for the participants will be available for the duration of the course and will allow participants to discuss questions with each other, and with the course leads.

The course material will be accessible for 3 months after the taught sessions.

At the end of the course, the knowledge will be assessed via an online knowledge test (optional). A certificate of attendance and of successful completion will be provided at the end of the course.

The course is delivered in English.

CPD course delivery team

Dr Yulia Cherdantseva is a Senior Lecturer in cyber security at the School of Computer Science & Informatics at Cardiff University and a cyber skills lead at the Cardiff Centre for Cyber Security Research. Yulia worked as a lead researcher on the project “Supervisory Control and Data Acquisition Systems Cyber Security Lifecycle (SCADA-CSL)” funded by the Airbus Group Endeavr Wales and the Welsh Assembly Government, where she developed a novel SCADA Cyber Security, Safety and Risk (SCADA CSSR) graphical extension for BPMN 2.0 and a configurable dependency model of a SCADA system. In 2020-2021, she led an NCSC and RISCS funded project about cyber-security decision-making by SMEs which resulted in the development of the Best Practice Guide for SME in Cyber Security Investment Decision-Making. In 2021, she was awarded an EPSRC grant for developing a framework for risk-informed and metrics-enriched cyber security playbooks for enhancing CNI resilience. As a cyber skills lead, Yulia is interested in cyber security education from the primary school up to professional development level. Since May 2021, Yulia is a member of the CyBOK Executive Board.  Yulia is passionate about equality, diversity and inclusion in cyber security.

Dr Philip Smart received his PhD in Computer Science from Cardiff University in 2009. After working as a researcher in the field of Geospatial Ontologies for three years, he spent a further eight years at Cardiff University as a senior developer developing bespoke Identity and Access Management systems. For the past 2 years he has been working for Jisc as a Trust and Identity Technical Specialist offering various consultancy services. Two days a week he works for the Shibboleth Consortium helping develop the Security Assertion Markup Language (SAML) based single-sign-on product, Shibboleth.

We offer a gateway for businesses to access the wide range of expertise available within Cardiff University.