Course Outline

Part 1. Introduction

Basic concepts

  • Safety limit
  • Source and sink metaphors
  • AppSec kill chain
  • Threat modeling

Part 2. Backend

Backend Overview

  • Assets and Attack Vectors
  • Backend Threat Model

Application boundary

  • Frontline Review
  • Authentication and authorization
  • Session management
  • Input Validation

Database boundary

  • Frontline Review
  • SQL injection
  • NoSQL injection

Operating system boundary

  • Frontline Review
  • Memory security
  • Command injection
  • Path traversal
  • The pros and cons of uploading files
  • XML external entity reference
  • Deserialize

Part 3. Frontend

Frontend Overview

  • The Tragedy of Cookies
  • Single Origin Policy
  • JavaScript
  • Frontend Threat Model

Origin boundary

  • Frontline Review
  • Cross site scripting
  • Cross-site request forgery
  • Cross site leaks
  • Other problems

Part 4. The Big Questions

How to keep a secret?

  • Secrets Management
  • Sensitive data management

How to ensure code and data integrity?

  • Supply Chain Attacks
  • Cache poisoning

How to maintain availability?

  • On the importance of keeping a diary
  • Self-healing systems
  • Surviving disasters
  • Surviving Volume Attacks
 14 Hours

Number of participants


Price Per Participant (Exc. Tax)

Testimonials (7)

Provisional Courses

Related Categories