Get in Touch

Course Outline

Part 1. Introduction

Core Concepts

  • Security Perimeter
  • Source and Sink Metaphors
  • AppSec Kill Chain
  • Threat Modeling

Part 2. Backend

Backend Overview

  • Assets and Attack Vectors
  • Backend Threat Model

Application Boundary

  • Frontline Review
  • Authentication and Authorization
  • Session Management
  • Input Validation

Database Boundary

  • Frontline Review
  • SQL Injection
  • NoSQL Injection

Operating System Boundary

  • Frontline Review
  • Memory Security
  • Command Injection
  • Path Traversal
  • The Bright and Dark Side of File Uploads
  • XML External Entity Reference
  • Deserialization

Part 3. Frontend

Frontend Overview

  • The Cookie Tragedy
  • Single Origin Policy
  • JavaScript
  • Frontend Threat Model

Origin Boundary

  • Frontline Review
  • Cross-Site Scripting
  • Cross-Site Request Forgery
  • Cross-Site Leaks
  • Other Issues

Part 4. Big Questions

How to Keep Secrets?

  • Secret Management
  • Handling Sensitive Data

How to Ensure Code and Data Integrity?

  • Supply Chain Attacks
  • Cache Poisoning

How to Maintain Availability?

  • The Importance of Logging
  • Self-Healing Systems
  • Disaster Recovery
  • Surviving Volumetric Attacks
 14 Hours

Testimonials (3)

Related Categories