⢠symmetric and asymmetric crypto-systems ⢠the TLS protocol ⢠network and host-based threat, vulnerabilities, attacks ⨠and counter-measures 15-437 Web Application Development ⢠the HTTP protocol ⢠how to deploy your web application over HTTPS ⢠web-based threats, vulnerabilities, attacks and counter-measures