Web application security
Protecting applications that are accessible via the Web requires well-prepared security professional who are at all time aware of current attack methods and trends. Plethora of technologies and environments exist that allow comfortable development of Web applications (like Java, ASP.NET or PHP). One should not only be aware of the security issues relevant to these platforms, but also of all general vulnerabilities that apply regardless of the used development tools.
Web developers, architects, and testers
Preparedness: Basic Web application
The course gives an overview of the applicable security solutions in Web applications, focusing on the most important technologies like secure communication and Web services, tackling both transport-layer security and end-to-end security solutions and standards like Web Services Security. The Web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained to avoid the associated problems. Exercises can be easily followed by programmers using different programming languages, thus the Web application-related topics can be easily combined with other secure coding subjects, and can thus effectively satisfy the needs of corporate development groups, who typically deal with various languages and development platforms to develop Web applications.
- Web-based attacks overview:
dangers of Internet Protocol technologies: IP/port scanning, zero day exploits, virus infections, botnets, spamming, phishing, vishing, distributed denial-of-service (DoS) attacks, identity theft, man-in-the-browser attack against internet banking services, organized large-scale cash-out by abusing hijacked bank accounts
- Web services:
SOAP and REST; secure communication and transport-layer security (TLS/SSL and IPSEC), application- and container-managed authentication, authorization; End-to-end security; Web Services Security (WSS), signing (XML Sig) and encryption (XML Enc)
- Vulnerabilities, attacks and mitigations
OWASP top 10 and other frequent vulnerabilities: SQL Injection and other injection flaws, Cross-Site Scripting: persistent and reflected XSS, Cross-Site Request Forgery (CSRF), malicious file execution, insecure direct object reference, uploading executable files, improper use of cryptographic features, challenges of password management, cracking hashed passwords with search engines; ASP.NET, Java and PHP vulnerabilities and practical security solutions
exploiting SQL injection step-by-step; crafting Cross-Site Scripting attacks through both reflective and persistent XSS; committing Cross-Site Request Forgery (CSRF); malicious file execution; insecure direct object reference; uploading and running executable code; cracking hashed values with search engines; information leakage through error reporting
Other relevant courses