Defending Web Applications Security Training

Defending Web Applications Security Training; Organizations and governments fall victim to internet-based attacks every day. In many cases, web attacks could be thwarted but hackers, organized criminal gangs, and foreign agents are able to exploit weaknesses in web applications. The Secure Web programmer knows how to identify, mitigate and defend against all attacks through designing and building systems that are resistant to failure. The secure web application developer knows how to develop web applications that aren’t subject to common vulnerabilities, and how to test and validate that their applications are secure, reliable and resistant to attack.

Web applications are increasingly more sophisticated and as such, they are critical to almost all major online businesses. As more applications are web enabled, the number of web application security issues will increase, traditional local system vulnerabilities, such as directory traversals, overflows and race conditions, are opened up to new vectors of attack. The responsibility for the security of sensitive systems will rest increasingly with the web developer, rather than the vendor or system administrator. As with most security issues involving client/server communications, Web application vulnerabilities generally stem from improper handling of client requests and/or a lack of input validation checking on the part of the developer.

Defending Web Applications Security TrainingDuration: 5 days

  • We can adapt this Defending Web Applications Security Training course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this Defending Web Applications Security Training course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Defending Web Applications Security Training Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Defending Web Applications Security course in manner understandable to lay audiences.

The target audience for this Defending Web Applications Security course:

  • Application developers
  • Application security analysts or managers
  • Application architects
  • Penetration testers who are interested in learning about defensive strategies
  • Security professionals who are interested in learning about web application security
  • Auditors who need to understand defensive mechanisms in web applications
  • Employees of PCI compliant organizations who need to be trained to comply with PCI requirements

The knowledge and skills that a learner must have before attending this Defending Web Applications Security course are:

  • This class requires a basic understanding of web application technology and concepts such as HTML and JavaScript.
Defending Web Applications Security Training - OBJECTIVES

Upon completing this Defending Web Applications Security course, learners will be able to meet these objectives:

  • How satellite communications relates to other forms of wireless systems that are used to provide one-way broadcasting and two-way interactive services, especially those delivered through the global Internet
Defending Web Applications Security Training - COURSE SYLLABUS

Module 1: Web Application Security

  • Web Application Security
  • Web Application Technologies and Architecture
  • Secure Design Architecture
  • Application Flaws and Defense Mechanisms
  • Defense In-Depth
  • Secure Coding Principles

Module 2: OWASP TOP 10

  • The Open Web Application Security Project (OWASP)
  • OWASP TOP 10 for 2017 & 2018

Module 3: Threat Modeling & Risk Management

  • Threat Modeling Tools & Resources
  • Identify Threats
  • Identify Countermeasures
  • Choosing a Methodology
  • Post Threat Modeling
  • Analyzing and Managing Risk
  • Incremental Threat Modeling
  • Identify Security Requirements
  • Understand the System
  • Root Cause Analysis

Module 4: Application Mapping

  • Application Mapping
  • Web Spiders
  • Web Vulnerability Assessment
  • Discovering other content
  • Application Analysis
  • Application Security Toolbox
  • Setting up a Testing Environment

Module 5: Authentication and Authorization attacks

  • Authentication
  • Different Types of Authentication (HTTP, Form)
  • Client Side Attacks
  • Authentication Attacks
  • Authorization
  • Modeling Authorization
  • Least Privilege
  • Access Control
  • Authorization Attacks
  • Access Control Attacks
  • User Management
  • Password Storage
  • User Names
  • Account Lockout
  • Passwords
  • Password Reset
  • Client-Side Security
  • Anti-Tampering Measures
  • Code Obfuscation
  • Anti-Debugging

Module 6: Session Management attacks

  • Session Management Attacks
  • Session Hijacking
  • Session Fixation
  • Environment Configuration Attacks

Module 7: Application Logic attacks

  • Application Logic Attacks
  • Information Disclosure Exploits
  • Data Transmission Attacks

Module 8: Data Validation

  • Input and Output Validation
  • Trust Boundaries
  • Common Data Validation Attacks
  • Data Validation Design
  • Validating Non-Textual Data
  • Validation Strategies & Tactics
  • Errors & Exception Handling
  • Structured Exception Handling
  • Designing for Failure
  • Designing Error Messages
  • Failing Securely

 Module 9: AJAX attacks

  • AJAX Attacks
  • Web Services Attacks
  • Application Server Attacks

Module 10: Code Review and Security Testing

  • Insecure Code Discovery and Mitigation
  • Testing Methodology
  • Client Side Testing
  • Session Management Testing
  • Developing Security Testing Scripts
  • Pen testing a Web Application

 Module 11: Web Application Penetration Testing

  • Insecure Code Discovery and Mitigation
  • Benefits of a Penetration Test
  • Current Problems in WAPT
  • Learning Attack Methods
  • Methods of Obtaining Information
  • Passive vs. Active Reconnaissance
  • Footprinting Defined
  • Introduction to Port Scanning OS Fingerprinting
  • Web Application Penetration Methodologies
  • The Anatomy of a Web Application Attack
  • Fuzzers

Module 12: Secure SDLC

  • Secure-Software Development Lifecycle (SDLC) Methodology
  • Web Hacking Methodology

Module 13: Cryptography

  • Overview of Cryptography
  • Key Management
  • Cryptography Application
  • True Random Generators (TRNG)
  • Symmetric/Asymmetric Cryptography
  • Digital Signatures and Certificates
  • Hashing Algorithms
  • XML Encryption and Digital Signatures
  • Authorization Attacks
  • Module 1: Environment Setup and Architecture
  • Module 2: OWASP TOP 2013: Session Management Attacks
  • Module 3: Threat Modeling
  • Module 4: Application Modeling and Analysis
  • Module 5: Authentication and Authorization Attacks
  • Module 6: Session Management Attacks
  • Module 9: AJAX Security
  • Module 10-1: Code Review
  • Module 10-2: Security Test Scripts
  • Module 10-3: Writing Java Secure Code
  • Annex 11: Alternatives Labs
  • Lab 11-1 4: WebGoat & WebScarab
  • Lab 11-2: WebGoat – Cross-Site Request Forgery (CSRF)
  • Lab 11-3 Missing Function Level Access Control
  • Lab 11-4: Perform Forced Browsing Attacks
Defending Web Applications Security Training Course Wrap-Up

Whether you are looking for general information or have a specific question, we want to help.
Request More Information

    Time frame: