SafeStack logo on purple background

Finding and Fixing Web Application Security Vulnerabilities

Finding and Fixing Web Application Security Vulnerabilities

  • Takes approximately 6 hours to complete

Description

Software security vulnerabilities are big business for potential attackers.

Identifying them early and knowing what common pitfalls to avoid can make a big difference to the resilience of your applications.

This course will help you to understand, identify, and avoid common software security vulnerabilities in your code.

Course objectives

  • Common web application security vulnerabilities and how to find them.
  • Approaches to avoid or reduce these vulnerabilities and how they work.
  • The challenges and trade-offs we face when implementing these controls.

Modules

Module 1: Object access vulnerabilities

  • What causes object access vulnerabilities.
  • How to identify them and understand their impact.
  • How to protect your application from this vulnerability.

Module 2: Enumeration vulnerabilities

  • What causes enumeration vulnerabilities and why they’re interesting to an attacker.
  • How to identify them and understand their impact.
  • How to protect your application from this vulnerability.

Module 3: SQL Injection vulnerabilities

  • What causes SQL injection vulnerabilities and why they’re so powerful.
  • How to identify them and understand their impact.
  • How to protect your application from this vulnerability.

Module 4: Configuration vulnerabilities

  • What causes configuration vulnerabilities and where in our stack we can find them.
  • How to identify them and understand their impact.
  • How to protect your application from this vulnerability.

Module 5: Operating system injection vulnerabilities

  • What causes operating system injection vulnerabilities and why they matter in a web application-focused world.
  • How to identify them and understand their impact.
  • How to protect your application from this vulnerability.

Module 6: Cross-site scripting vulnerabilities (XSS)

  • What causes cross-site scripting (XSS) vulnerabilities and how they are exploited.
  • How to identify them and understand their impact.
  • How to protect your application from this vulnerability.

Module 7: Passwords and authentication

  • Common password behaviors and why they happen.
  • How to securely store passwords within our applications.
  • Multi-factor authentication and the challenge of choosing the best one for your context.
  • Life beyond passwords and the future of authentication.

Module 8: Session vulnerabilities

  • What causes session vulnerabilities and the rules we can follow to protect our session identifiers.
  • How to identify them and understand their impact.
  • How to protect your application from this vulnerability.

Module 9: Using components with known vulnerabilities

  • Why does software have vulnerabilities?
  • How do we respond when our dependencies have vulnerabilities?
  • What is the impact of these vulnerabilities on us and the wider ecosystem?

Try SafeStack today

Bring security skills to your entire software development lifecycle