Web Servers, Auth, Passwords and Security

KSBs

K7

software design approaches and patterns, to identify reusable solutions to commonly occurring problems

The reading in this module goes through patterns for solving common security problems.

K8

organisational policies and procedures relating to the tasks being undertaken, and when to follow them, e.g. the storage and treatment of GDPR sensitive data

Standard procedures to ensure that security is being considered in various situations are discussed, including how GDPR relates to logging.

S5

conduct a range of test types, such as Integration, System, User Acceptance, Non-Functional, Performance and Security testing

In the exercises for this module, the learners are conducting security testing; in particular the XSS game is a form of penetration testing.

S17

interpret and implement a given design whist remaining compliant with security and maintainability requirements

The exercise in this module involves practical application of security-focused web development and the maintainability of learner code is a consideration of the trainer throughout the course.

B5

acts with integrity with respect to ethical, legal and regulatory ensuring the protection of personal data, safety and security

This module highlights the importance of these issues, and the group discussion will encourage further engagement.