Get in Touch

Course Outline

Part 1. Introduction

Basic Concepts

  • Security Boundary
  • Sources and Sinks Metaphors
  • AppSec Kill Chain
  • Threat Modeling

Part 2. Backend

Backend Overview

  • Assets and Attack Vectors
  • Backend Threat Model

Application Boundary

  • Frontline Overview
  • Authentication and Authorization
  • Session Management
  • Input Validation

Database Boundary

  • Frontline Overview
  • SQL Injection
  • NoSQL Injection

Operating System Boundary

  • Frontline Overview
  • Memory Security
  • Command Injection
  • Path Traversal
  • Uploads: Brights and Shadows
  • XML External Entity Reference
  • Deserialization

Part 3. Frontend

Frontend Overview

  • Cookies Tragedy
  • Single Origin Policy
  • JavaScript
  • Frontend Threat Model

Origin Boundary

  • Frontline Overview
  • Cross-site Scripting
  • Cross-site Request Forgery
  • Cross-site Leaks
  • Other Issues

Part 4. Big Questions

How to keep secrets?

  • Secrets Management
  • Sensitive Data Management

How to ensure code and data integrity?

  • Supply Chain Attacks
  • Cache Poisoning

How to maintain availability?

  • On the Importance of Keeping a Logbook
  • Self-healing Systems
  • Catastrophe Survival
  • Surviving Volumetric Attacks
 14 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories