This HTML5 document contains 6 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
wdrshttp://www.w3.org/2007/05/powder-s#
n2http://www.semanticweb.org/yamen#
n4http://demo.openlinksw.com/about/id/entity/https/mmisw.org/ont/~yamensvu/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
xsdhhttp://www.w3.org/2001/XMLSchema#

Statements

Subject Item
n2:AWS
rdf:type
n2:Course owl:NamedIndividual
wdrs:describedby
n4:HW
n2:About
The primary goal of this course is to identify gaps and security threats in the ICT mainly, Internet and Web Applications, and providing the best solution to secure the ICT systems and applications. We focus in this course in web application threats and vulnerabilities, analyzing the threats and design the best solutions for protection. This course aims to : (1) Identify the ethics of the use of the Internet and related laws . (2) Identify the most important security problems faced the networks and internet services (3) Identify vulnerabilities in operating systems and computer networks (4) Analysis of different types of vulnerabilities in web applications and how to detect them (5) Study methods of designing Web applications safe and meet the safety requirements, design, Implementation, and testing. (6) Risk and Security management
n2:AcronymFor
Web Security
n2:BelongesToProgram
n2:MWS