Finding and Fixing Web Application Security Vulnerabilities
Description
Software security vulnerabilities are big business for potential attackers. Identifying them early and knowing what common pitfalls to avoid can make a big difference to the resilience of your applications.
This course will help you to understand, identify, and avoid common software security vulnerabilities in your code.
Duration
Takes approximately 7 hours to complete
Certification
Course Objectives
Common web application security vulnerabilities and how to find them.
Approaches to avoid or reduce these vulnerabilities and how they work.
The challenges and trade-offs we face when implementing these controls.
Syllabus
Module 1: Object access vulnerabilities
What causes object access vulnerabilities.
How to identify them and understand their impact.
How to protect your application from this vulnerability.
Module 2: Enumeration vulnerabilities
What causes enumeration vulnerabilities and why they’re interesting to an attacker.
How to identify them and understand their impact.
How to protect your application from this vulnerability.
Module 3: SQL Injection vulnerabilities
What causes SQL injection vulnerabilities and why they’re so powerful.
How to identify them and understand their impact.
How to protect your application from this vulnerability.
Module 4: Configuration vulnerabilities
What causes configuration vulnerabilities and where in our stack we can find them.
How to identify them and understand their impact.
How to protect your application from this vulnerability.
Module 5: Operating system injection vulnerabilities
What causes operating system injection vulnerabilities and why they matter in a web application-focused world.
How to identify them and understand their impact.
How to protect your application from this vulnerability.
Module 6: Cross-site scripting vulnerabilities (XSS)
What causes cross-site scripting (XSS) vulnerabilities and how they are exploited.
How to identify them and understand their impact.
How to protect your application from this vulnerability.
Module 7: Passwords and authentication
Common password behaviors and why they happen.
How to securely store passwords within our applications.
Multi-factor authentication and the challenge of choosing the best one for your context.
Life beyond passwords and the future of authentication.
Module 8: Session vulnerabilities
What causes session vulnerabilities and the rules we can follow to protect our session identifiers.
How to identify them and understand their impact.
How to protect your application from this vulnerability.
Module 9: Using components with known vulnerabilities
Why software has vulnerabilities.
How we respond when our dependencies have vulnerabilities.
What the impact is of these vulnerabilities on us and the wider ecosystem.
Module 10: Path Traversal
What causes path traversal vulnerabilities.
How to identify them and understand their impact.
How to protect your application from this vulnerability.
Module 11: Return of the SQL Injection
SQL output, and how that impacts the type of injection attack.
How to identify and attack UNION SQL injection vulnerabilities.
Diving deeper into blind SQL injection vulnerabilities.
Module 12: XML External Entity (XXE)
What causes XML External Entity (XXE) vulnerabilities.
How to identify them and understand their impact.
How to protect your application from this vulnerability.