Bespoke Web application security Certificate for Adam Holdbrook
-
Security Intro
-
Security vocabulary
-
CVSS vectors
-
CIA classification
-
Online resources
-
Vulnerability databases
-
Exploit databases
-
-
Vulnerability detection
-
Active scanning
-
Passive scanning
-
Code scanning
-
Dependency scanning
-
-
Security testing
-
Pentests
-
Red teaming
-
DecSecOps – planning secure development cycle
-
-
-
Threat modeling for web application
-
Information disclosure
-
Unauthorized access
-
Unauthorized actions
-
Impersonation
-
Business logic errors
-
Deface
-
Resource stealing
-
Denial of Service
-
APT attacks
-
MITRE Att&CK
-
-
-
Common web vulnerabilities
For every vulnerability the following sections will be covered:
-
Mechanism
-
Detection (active test, passive test, code scanning)
-
Exploitation
-
Prevention
-
-
Injections
-
SQL injections
-
No-SQL injections
-
LDAP injections
-
Command injections
-
Server-side template injections
-
-
Broken authentication
-
Broken access control
-
Sensitive data exposure
-
XXE attacks
-
Clickjacking
-
Cross site scripting
-
Reflected
-
Stored
-
DOM-based
-
-
Insecure deserialization
-
Cross-site request forgery (CSRF)
-
Server-side request forgery (SSRF)
-
CORS vulnerabilities
-
HTTP request smuggling
-
Web cache poisoning
-
Web cache deception
-
OAuth vulnerabilities
-
-
Docker security
-
Security cheat sheet
-
Container scanning
-
Examples of vulnerabilities
-
-
Vulnerability chaining & case studies