Mobile Web w/HTML, CSS & JS

Conversion of desktop websites and an introduction to building web applications for smartphones and mobile devices with intermediate HTML, CSS, and JavaScript. Includes techniques such as Geolocation, Local Storage, RWD, PWA, etc. and how to use famous development frameworks and platforms.

JavaScript Libraries/Frameworks

An extension of the JavaScript course to define and study the use of the most common JavaScript frameworks/libraries used to enhance web development projects. These libraries are useful when building high-scale applications with multiple concurrent requests and creating sophisticated front-end web development projects.

Intermediate HTML and CSS

Intermediate and advanced HTML and CSS, based on W3C latest standards, to create websites or web applications on the World Wide Web, including images, multimedia, tables, and forms. Cascading Style Sheets used to standardize the appearance of web pages. Introduction to JavaScript, XML and definition of server side technology.

XML and JSON

Introduction to eXtensible Markup Language (XML) and JavaScript Object Notation
(JSON). Hands-on experience with XML documents, Document Type Definition (DTD),
namespaces, schemas, and data presentation with eXtensible Style Language (XSLT) or
Cascading Style Sheets (CSS). Introduction to JSON syntax to store and exchange data.

Internet Basics and Beginning HTML

Methods of using the Internet. History, design and protocol methods used on Internet
including: electronic mail, connection to remote computers, file transfer, World Wide
Web, basic web page creation and publishing using HTML and CSS. Additional topics
include: computer security, copyright and electronic commerce, and basic Unix shell
commands requisite to shell account use.

Securing Web Applications

This course teaches techniques used by attackers to breach Web applications and how to prevent security attacks. Topics include how to secure and manage assets such as authentication systems, access controls, databases, and back-end components, and how to protect users from attackers, including identifying common vulnerabilities in compiled code and source code.