Get in Touch

Course Outline

IT Security and Secure Coding

  • Overview of information security principles
  • The CIA triad: Confidentiality, Integrity, and Availability
  • Common threats and threat modeling techniques
  • Best practices for the Secure Software Development Lifecycle (SSDLC)

Web Application Security

  • Understanding the OWASP Top Ten and other critical vulnerabilities
  • Flaws in authentication and session management
  • Injection vulnerabilities (SQL, Command, LDAP, etc.)
  • Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF)

Client-Side Security

  • DOM-based attacks and risks specific to JavaScript
  • Insecure usage of AJAX and browser storage mechanisms
  • Clickjacking and UI redressing techniques
  • Implementation of Content Security Policy (CSP)

Practical Cryptography

  • Foundational concepts: hashing, encryption, and digital signatures
  • Distinctions between public key and symmetric key cryptography
  • Basics of Transport Layer Security (TLS)
  • Key management strategies and common cryptographic mistakes

Security of Web Services

  • Security considerations for SOAP and REST architectures
  • Authentication mechanisms including OAuth, JWT, and API keys
  • Common web service attacks and corresponding defenses
  • Input validation within service payloads

XML Security

  • XML injection and parsing attacks
  • Entity expansion and XML External Entity (XXE) vulnerabilities
  • Secure parsing techniques and libraries
  • Utilizing XML Security standards (XML-DSig, XML-Enc)

Knowledge Sources and Security Tools

  • Recommended security testing tools (e.g., OWASP ZAP, Burp Suite)
  • Code scanning and analysis utilities
  • Online resources and security guidelines
  • Strategies for staying informed about emerging threats

Summary and Next Steps

Requirements

  • A solid understanding of basic web application architecture
  • Proficiency in a programming language such as Java, C#, PHP, or JavaScript
  • Familiarity with client-server communication and HTTP protocols

Audience

  • Developers
  • Web application architects
  • Technical teams with a focus on security
 14 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories