• Overview of application security
  • Common threats and vulnerabilities
  • Case studies of real-world attacks