Course Outline

Part 1. Introduction

 

Basic concepts

  • Security boundary Source and sink metaphors AppSec kill chain Threat modeling

Part 2. Backend

 

Backend overview

  • Assets and attack vectors Backend threat model

 

Application boundary

  • Frontline Overview Authentication and Authorization Session Management Input Validation

 

Database boundary

  • Frontline Review SQL injection NoSQL injection

 

Operating system boundary

  • Frontline Overview Memory Security Command Injection Path Traversal The Lights and Shadows of File Upload XML external entity reference Deserialization

Part 3. Frontend

 

Frontend overview

  • The Cookie Tragedy Single Origin Policy JavaScript Frontend Threat Model

 

Border of origin

  • Cross-site scripting frontline review
  • Cross-site request forgery
  • Cross-site leaks
  • Inne problemy

Part 4. Big questions

 

How to keep a secret?

  • Secrets management. Managing sensitive data

 

How to ensure code and data integrity?

  • Supply chain attacks Cache poisoning

 

How to maintain availability?

  • About the importance of keeping a diary Self-healing systems Surviving disasters Surviving volume attacks

 

 14 Hours

Number of participants



Price per participant

Testimonials (5)

Related Courses

IBM Qradar SIEM: Beginner to Advanced

14 Hours

Introduction to ISO27001

7 Hours

CISA - Certified Information Systems Auditor

28 Hours

CISA - Certified Information Systems Auditor - Exam Preparation

28 Hours

CISMP - Certificate in Information Security Management Principles

21 Hours

CISSP - Certified Information Systems Security Professional

35 Hours

Certified Information System Security Professional (CISSP) CBK Review

35 Hours

Data Security Officer ISO 27001:2017

21 Hours

FlexNet Administration

14 Hours

Introducing Information Security & Charting a Career Path

7 Hours

Fundamentals of Information Systems Security

21 Hours

Building up information security according to ISO 27005

21 Hours

Network Penetration Testing

35 Hours

Open Data Risk Analysis and Management

21 Hours

Public Key Infrastructure

21 Hours

Related Categories