Get in Touch

Course Outline

Part 1. Introduction

Basic Concepts

  • Security Boundary
  • Sources and Sinks Metaphor
  • AppSec Kill Chain
  • Threat Modeling

Part 2. Backend

Backend Overview

  • Assets and Attack Vectors
  • Backend Threat Model

Application Boundary

  • Frontline Overview
  • Authentication and Authorization
  • Session Management
  • Input Validation

Database Boundary

  • Frontline Overview
  • SQL Injection
  • NoSQL Injection

Operating System Boundary

  • Frontline Overview
  • Memory Safety
  • Command Injection
  • Path Traversal
  • Uploads: Pros and Cons
  • XML External Entity Reference
  • Deserialization

Part 3. Frontend

Frontend Overview

  • Tragedy of the Commons
  • Single Origin Policy
  • JavaScript
  • Frontend Threat Model

Origin Boundary

  • Frontline Overview
  • Cross-Site Scripting
  • Cross-Site Request Forgery
  • Cross-Site Leaks
  • Other Issues

Part 4. Big Questions

How to Keep Secrets?

  • Secret Management
  • Sensitive Data Management

How to Ensure Code and Data Integrity?

  • Supply Chain Attacks
  • Cache Poisoning

How to Maintain Availability?

  • On the Importance of Keeping a Log
  • Self-Healing Systems
  • Catastrophe Resilience
  • Volume Attack Resilience
 14 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories