Part IV

Deadline: 23.12.2019

This part focuses on security issues related to interconnected software. The participant will learn the principles of developing web applications, typical security issues that are related to such applications, and how such issues are discovered and mitigated.

You are not logged in. Some parts of the material are only for logged in users. You can log in here:

The course consists of 6 parts.

How to get started

This material contains the securing software part of the course series called Cyber Security Base. During this course, you will learn how web software works and is developed, the types of typical security flaws in such software, the vulnerabilities that these flaws cause, and how these flaws can be fixed.

Once you have created the account, please answer a background questionnaire at Answering the questionnaire should take less than 10 minutes and will be very valuable for the research conducted on this course.

When answering the short essay questions in this course, please answer them carefully and with thought. Other participants in the course will review them and may give you feedback.

How to pass the course

Essays must be within 20% of the proposed length. If they're not within this limit you will not get any points for your answer. We also may reject your answer if it's flagged too many times as spam or if it doesn't contain deep enough discussion. Also, we may reject your peer reviews if you haven't put genuine effort into them.

To pass the course you need to get 130 points (max 152 points). Each passed essay or completed programming exercise is equivalent to 5 points, and each passed multiple choice question is equivalent to 1 point.

In this part:
  1. 1. Finding defects