We may earn an affiliate commission when you visit our partners.
Course image
John Elliott and Troy Hunt
In this course, Defending Against JavaScript Keylogger Attacks on Payment Card Information, John Elliott and Troy Hunt discuss the most common attack used to steal payment card data and how to defend against it. Learn how security people think about a problem, why criminals attack, how their tools and techniques work, and how you have to adapt as defenders. By the end of this course, you’ll have a better understanding of the NIST model, how thinking about detection is equally important, and response/recovery.
Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Taught by Troy Hunt and John Elliott, well-regarded security experts recognized for their work in cybersecurity
Helps learners understand and defend against JavaScript keylogger attacks on payment card information
Develops learners understanding of the NIST model, detection, response and recovery
May be useful for security professionals, web developers, and software engineers

Save this course

Save Defending Against JavaScript Keylogger Attacks on Payment Card Information to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Defending Against JavaScript Keylogger Attacks on Payment Card Information. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Defending Against JavaScript Keylogger Attacks on Payment Card Information will develop knowledge and skills that may be useful to these careers:
Web Security Engineer
Web Security Engineers build and implement security policies and procedures to protect web applications, including e-commerce sites that process payment card information, from malicious attacks and data breaches. Taking a course on Defending Against JavaScript Keylogger Attacks on Payment Card Information will help you understand the most common attack used to steal payment card data and how to defend against it. This knowledge will be essential in your role as a Web Security Engineer.
DevOps Engineer
DevOps Engineers are responsible for the development and operation of software systems, including web applications that process payment card information. By taking a course on Defending Against JavaScript Keylogger Attacks on Payment Card Information, you will gain a better understanding of the security risks associated with web applications and how to mitigate them. This knowledge will be valuable in your role as a DevOps Engineer.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Taking a course on Defending Against JavaScript Keylogger Attacks on Payment Card Information will help you understand the most common attack used to steal payment card data and how to defend against it. This knowledge will be essential in your role as an Information Security Analyst.
Security Architect
Security Architects design and implement security solutions for an organization's information systems, including web applications that process payment card information. By taking a course on Defending Against JavaScript Keylogger Attacks on Payment Card Information, you will gain a better understanding of the security risks associated with web applications and how to mitigate them. This knowledge will be valuable in your role as a Security Architect.
Cloud Security Engineer
Cloud Security Engineers are responsible for the security of cloud-based applications and data. By taking a course on Defending Against JavaScript Keylogger Attacks on Payment Card Information, you will gain a better understanding of the security risks associated with cloud-based applications and how to mitigate them. This knowledge will be valuable in your role as a Cloud Security Engineer.
Penetration Tester
Penetration Testers are responsible for identifying and exploiting security vulnerabilities in an organization's information systems, including web applications that process payment card information. Taking a course on Defending Against JavaScript Keylogger Attacks on Payment Card Information will help you understand the most common attack used to steal payment card data and how to defend against it. This knowledge will be essential in your role as a Penetration Tester.
Forensic Analyst
Forensic Analysts investigate security breaches and cybercrimes, including those involving the theft of payment card information. Taking a course on Defending Against JavaScript Keylogger Attacks on Payment Card Information will help you understand the most common attack used to steal payment card data and how to investigate and respond to it. This knowledge will be valuable in your role as a Forensic Analyst.
Incident Responder
Incident Responders are responsible for responding to and mitigating security incidents, including those involving the theft of payment card information. Taking a course on Defending Against JavaScript Keylogger Attacks on Payment Card Information will help you understand the most common attack used to steal payment card data and how to respond to and mitigate it. This knowledge will be essential in your role as an Incident Responder.
Risk Analyst
Risk Analysts assess and manage risks to an organization's information systems, including web applications that process payment card information. Taking a course on Defending Against JavaScript Keylogger Attacks on Payment Card Information will help you understand the most common attack used to steal payment card data and how to assess and mitigate the risk of it occurring. This knowledge will be valuable in your role as a Risk Analyst.
Compliance Analyst
Compliance Analysts ensure that an organization's information systems are in compliance with applicable laws and regulations, including those related to the protection of payment card information. Taking a course on Defending Against JavaScript Keylogger Attacks on Payment Card Information will help you understand the most common attack used to steal payment card data and how to comply with the laws and regulations that protect it. This knowledge will be valuable in your role as a Compliance Analyst.
Threat Intelligence Analyst
Threat Intelligence Analysts collect and analyze information about threats to an organization's information systems, including web applications that process payment card information. Taking a course on Defending Against JavaScript Keylogger Attacks on Payment Card Information will help you understand the most common attack used to steal payment card data and how to identify and mitigate it. This knowledge will be valuable in your role as a Threat Intelligence Analyst.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to protect their information systems, including web applications that process payment card information. Taking a course on Defending Against JavaScript Keylogger Attacks on Payment Card Information will help you understand the most common attack used to steal payment card data and how to defend against it. This knowledge will be valuable in your role as a Security Consultant.
Software Developer
Software Developers design and develop software applications, including web applications that process payment card information. Taking a course on Defending Against JavaScript Keylogger Attacks on Payment Card Information may help you to understand the security risks associated with web applications and how to mitigate them. This knowledge could be valuable in your role as a Software Developer.
System Administrator
System Administrators manage and maintain computer systems, including web servers that host web applications that process payment card information. Taking a course on Defending Against JavaScript Keylogger Attacks on Payment Card Information may help you to understand the security risks associated with web servers and how to mitigate them. This knowledge could be valuable in your role as a System Administrator.
Database Administrator
Database Administrators manage and maintain databases, including those that store payment card information. Taking a course on Defending Against JavaScript Keylogger Attacks on Payment Card Information may help you to understand the security risks associated with databases and how to mitigate them. This knowledge could be valuable in your role as a Database Administrator.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Defending Against JavaScript Keylogger Attacks on Payment Card Information.
This document provides a list of the top 10 web application security risks. It is recommended for those who want to understand the most common threats to web applications.
This handbook provides a comprehensive overview of web application penetration testing. It is recommended for those who want to learn more about how to test for keylogging attacks and other vulnerabilities.
Provides a comprehensive overview of web application security. It is recommended for those who want to learn more about the technical aspects of these attacks and how to defend against them.
Practical guide to finding and exploiting security flaws in web applications. It covers keylogging attacks in detail and is recommended for those who want to learn more about the technical aspects of these attacks.
Provides a comprehensive overview of JavaScript. It is recommended for those who want to learn more about the technical aspects of JavaScript and how it can be used to develop secure applications.
Provides a concise overview of the good parts of JavaScript. It is recommended for those who want to understand the basics of JavaScript and how it can be used to develop secure applications.
This cookbook provides a collection of recipes for securing web applications. It is recommended for those who want to learn more about how to implement security measures in their applications.
Provides a comprehensive overview of web application security, including keylogging attacks. It is recommended for beginners or those who want to understand the basics.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser