Defending Web Applications Security Training
Defending Web Applications Security Training; Organizations and governments fall victim to internet-based attacks every day. In many cases, web attacks could be thwarted but hackers, organized criminal gangs, and foreign agents are able to exploit weaknesses in web applications. The Secure Web programmer knows how to identify, mitigate and defend against all attacks through designing and building systems that are resistant to failure. The secure web application developer knows how to develop web applications that aren’t subject to common vulnerabilities, and how to test and validate that their applications are secure, reliable and resistant to attack.
Web applications are increasingly more sophisticated and as such, they are critical to almost all major online businesses. As more applications are web enabled, the number of web application security issues will increase, traditional local system vulnerabilities, such as directory traversals, overflows and race conditions, are opened up to new vectors of attack. The responsibility for the security of sensitive systems will rest increasingly with the web developer, rather than the vendor or system administrator. As with most security issues involving client/server communications, Web application vulnerabilities generally stem from improper handling of client requests and/or a lack of input validation checking on the part of the developer.
Duration: 5 days
RESOURCES
- Defending Web Applications Security Training – https://www.wiley.com/
- Defending Web Applications Security Training – https://www.packtpub.com/
- Defending Web Applications Security Training – https://store.logicaloperations.com/
- Defending Web Applications Security Training – https://us.artechhouse.com/
- Defending Web Applications Security Training – https://www.amazon.com/
RELATED COURSES
- Secure Coding in PHP Training
- Secure Coding in C/C++ Training
- Secure Coding in .NET Training
- Secure Coding for Android Platform Training
- Secure Coding for iOS Platform Training
- Secure Coding in Java/JEE: Developing Defensible Applications Training
- Secure Coding in .NET: Developing Defensible Applications Training
CUSTOMIZE It
- We can adapt this Defending Web Applications Security Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Defending Web Applications Security Training course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Defending Web Applications Security Training Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Defending Web Applications Security course in manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The target audience for this Defending Web Applications Security course:
- Application developers
- Application security analysts or managers
- Application architects
- Penetration testers who are interested in learning about defensive strategies
- Security professionals who are interested in learning about web application security
- Auditors who need to understand defensive mechanisms in web applications
- Employees of PCI compliant organizations who need to be trained to comply with PCI requirements
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this Defending Web Applications Security course are:
- This class requires a basic understanding of web application technology and concepts such as HTML and JavaScript.
Defending Web Applications Security Training - OBJECTIVES
Upon completing this Defending Web Applications Security course, learners will be able to meet these objectives:
- How satellite communications relates to other forms of wireless systems that are used to provide one-way broadcasting and two-way interactive services, especially those delivered through the global Internet
Defending Web Applications Security Training - COURSE SYLLABUS
Module 1: Web Application Security
- Web Application Security
- Web Application Technologies and Architecture
- Secure Design Architecture
- Application Flaws and Defense Mechanisms
- Defense In-Depth
- Secure Coding Principles
Module 2: OWASP TOP 10
- The Open Web Application Security Project (OWASP)
- OWASP TOP 10 for 2017 & 2018
Module 3: Threat Modeling & Risk Management
- Threat Modeling Tools & Resources
- Identify Threats
- Identify Countermeasures
- Choosing a Methodology
- Post Threat Modeling
- Analyzing and Managing Risk
- Incremental Threat Modeling
- Identify Security Requirements
- Understand the System
- Root Cause Analysis
Module 4: Application Mapping
- Application Mapping
- Web Spiders
- Web Vulnerability Assessment
- Discovering other content
- Application Analysis
- Application Security Toolbox
- Setting up a Testing Environment
Module 5: Authentication and Authorization attacks
- Authentication
- Different Types of Authentication (HTTP, Form)
- Client Side Attacks
- Authentication Attacks
- Authorization
- Modeling Authorization
- Least Privilege
- Access Control
- Authorization Attacks
- Access Control Attacks
- User Management
- Password Storage
- User Names
- Account Lockout
- Passwords
- Password Reset
- Client-Side Security
- Anti-Tampering Measures
- Code Obfuscation
- Anti-Debugging
Module 6: Session Management attacks
- Session Management Attacks
- Session Hijacking
- Session Fixation
- Environment Configuration Attacks
Module 7: Application Logic attacks
- Application Logic Attacks
- Information Disclosure Exploits
- Data Transmission Attacks
Module 8: Data Validation
- Input and Output Validation
- Trust Boundaries
- Common Data Validation Attacks
- Data Validation Design
- Validating Non-Textual Data
- Validation Strategies & Tactics
- Errors & Exception Handling
- Structured Exception Handling
- Designing for Failure
- Designing Error Messages
- Failing Securely
Module 9: AJAX attacks
- AJAX Attacks
- Web Services Attacks
- Application Server Attacks
Module 10: Code Review and Security Testing
- Insecure Code Discovery and Mitigation
- Testing Methodology
- Client Side Testing
- Session Management Testing
- Developing Security Testing Scripts
- Pen testing a Web Application
Module 11: Web Application Penetration Testing
- Insecure Code Discovery and Mitigation
- Benefits of a Penetration Test
- Current Problems in WAPT
- Learning Attack Methods
- Methods of Obtaining Information
- Passive vs. Active Reconnaissance
- Footprinting Defined
- Introduction to Port Scanning OS Fingerprinting
- Web Application Penetration Methodologies
- The Anatomy of a Web Application Attack
- Fuzzers
Module 12: Secure SDLC
- Secure-Software Development Lifecycle (SDLC) Methodology
- Web Hacking Methodology
Module 13: Cryptography
- Overview of Cryptography
- Key Management
- Cryptography Application
- True Random Generators (TRNG)
- Symmetric/Asymmetric Cryptography
- Digital Signatures and Certificates
- Hashing Algorithms
- XML Encryption and Digital Signatures
- Authorization Attacks
LAB OUTLINE
- Module 1: Environment Setup and Architecture
- Module 2: OWASP TOP 2013: Session Management Attacks
- Module 3: Threat Modeling
- Module 4: Application Modeling and Analysis
- Module 5: Authentication and Authorization Attacks
- Module 6: Session Management Attacks
- Module 9: AJAX Security
- Module 10-1: Code Review
- Module 10-2: Security Test Scripts
- Module 10-3: Writing Java Secure Code
- Annex 11: Alternatives Labs
- Lab 11-1 4: WebGoat & WebScarab
- Lab 11-2: WebGoat – Cross-Site Request Forgery (CSRF)
- Lab 11-3 Missing Function Level Access Control
- Lab 11-4: Perform Forced Browsing Attacks
Defending Web Applications Security Training Course Wrap-Up
Whether you are looking for general information or have a specific question, we want to help.
Request More Information