Web application security
Kursavgift: kr 14 900 | Varighet: 2 dager
Web developers, architects, and testers
Preparedness: Basic Web application
The course gives an overview of the applicable security solutions in Web applications, focusing on the most important technologies like secure communication and Web services, tackling both transport-layer security and end-to-end security solutions and standards like Web Services Security.
The Web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained to avoid the associated problems. Exercises can be easily followed by programmers using different programming languages, thus the Web application-related topics can be easily combined with other secure coding subjects, and can thus effectively satisfy the needs of corporate development groups, who typically deal with various languages and development platforms to develop Web applications.
- Web-based attacks overview:
dangers of Internet Protocol technologies: IP/port scanning, zero day exploits, virus infections, botnets, spamming, phishing, vishing, distributed denial-of-service (DoS) attacks, identity theft, man-in-the-browser attack against internet banking services, organized large-scale cash-out by abusing hijacked bank accounts
- Web services:
SOAP and REST; secure communication and transport-layer security (TLS/SSL and IPSEC), application- and container-managed authentication, authorization; End-to-end security; Web Services Security (WSS), signing (XML Sig) and encryption (XML Enc)
- Vulnerabilities, attacks and mitigations
OWASP top 10 and other frequent vulnerabilities: SQL Injection and other injection flaws, Cross-Site Scripting: persistent and reflected XSS, Cross-Site Request Forgery (CSRF), malicious file execution, insecure direct object reference, uploading executable files, improper use of cryptographic features, challenges of password management, cracking hashed passwords with search engines; ASP.NET, Java and PHP vulnerabilities and practical security solutions
exploiting SQL injection step-by-step; crafting Cross-Site Scripting attacks through both reflective and persistent XSS; committing Cross-Site Request Forgery (CSRF); malicious file execution; insecure direct object reference; uploading and running executable code; cracking hashed values with search engines; information leakage through error reporting