SafeStack logo on purple background

Advanced Finding and Fixing Web Security Vulnerabilities

Advanced Finding and Fixing Web Security Vulnerabilities

Description

Every year new classes of web application security flaws are uncovered. Keeping across all these vulnerabilities can help prepare you, and your systems, against abuse.

Following on from our Finding and Fixing Web Application Security Vulnerabilities course, this new course will help identify and remediate more advanced flaws. In addition to new classes of weakness, we’ll also dive deeper into vulnerabilities covered in earlier courses – notably, SQL injection, and JWT attacks.

Complementary SafeStack courses

Doing the courses listed below can help you get prepared for Advanced Finding and Fixing Web Security Vulnerabilities.

Course objectives

  • Discover more advanced web application security vulnerabilities
  • Learn approaches to uncover these issues, and controls to reduce the risk
  • Use hands on techniques to discover the impact of these weaknesses

Modules

Module 1: Path Traversal

  • What causes path traversal vulnerabilities
  • How to identify them and understand their impact
  • How to protect your application from this vulnerability

Module 2: Return of the SQL Injection

  • SQL output, and how that impacts the type of injection attack
  • How to identify and attack UNION SQL injection vulnerabilities
  • Diving deeper into blind SQL injection vulnerabilities

Module 3: XML External Entity (coming soon!)

  • What causes XML External Entity (XXE) vulnerabilities
  • How to identify them and understand their impact
  • How to protect your application from this vulnerability

Module 4: Cross-Site Request Forgery (coming soon!)

  • What causes Cross-Site Request Forgery (CSRF) vulnerabilities
  • How to identify them and understand their impact
  • How to protect your application from this vulnerability

Module 5: Deserialization (coming soon!)

  • What causes insecure deserialization vulnerabilities
  • How to identify them and understand their impact
  • How to protect your application from this vulnerability

Module 6: Next-level JWT attacks (coming soon!)

  • What causes JWT vulnerabilities
  • How to identify them and understand their impact
  • How to protect your application from this vulnerability

Module 7: Server-Side Request Forgery (coming soon!)

  • What causes Server-Side Request Forgery (SSRF) vulnerabilities
  • How to identify them and understand their impact
  • How to protect your application from this vulnerability

Try SafeStack today

Bring security skills to your entire software development lifecycle