Get in Touch

Course Outline

A01:2025 - Broken Access Control
A02:2025 - Security Misconfiguration
A03:2025 - Software Supply Chain Failures
A04:2025 - Cryptographic Failures
A05:2025 - Injection
A06:2025 - Insecure Design
A07:2025 - Authentication Failures
A08:2025 - Software or Data Integrity Failures
A09:2025 - Security Logging and Alerting Failures
A10:2025 - Mishandling of Exceptional Conditions

A01:2025 Broken Access Control - Access control ensures that users operate strictly within their permitted boundaries. Failures in this area typically result in unauthorized disclosure, modification, or destruction of data, or allow users to perform business functions beyond their authorized limits.


A02:2025 Security Misconfiguration - This occurs when a system, application, or cloud service is configured incorrectly from a security standpoint, thereby creating vulnerabilities.


A03:2025 Software Supply Chain Failures - These failures involve breakdowns or compromises in the processes of building, distributing, or updating software. They are frequently caused by vulnerabilities or malicious alterations in third-party code, tools, or dependencies that the system depends on.


A04:2025 Cryptographic Failures - Ideally, all data in transit should be encrypted at the transport layer (OSI layer 4). Historically, challenges such as CPU performance and private key/certificate management have been addressed by modern CPUs with instructions designed to accelerate encryption (e.g., AES support) and simplified management services like LetsEncrypt.org. Major cloud vendors further enhance this with tightly integrated certificate management services. Beyond securing the transport layer, it is crucial to identify data that requires encryption at rest and additional encryption in transit at the application layer (OSI layer 7). For instance, passwords, credit card numbers, health records, personal information, and business secrets demand extra protection, particularly when subject to privacy laws like the EU's General Data Protection Regulation (GDPR) or regulations such as the PCI Data Security Standard (PCI DSS).


A05:2025 Injection - An injection vulnerability is a flaw that allows an attacker to insert malicious code or commands (such as SQL or shell code) into a program's input fields. This tricks the system into executing the code as if it were legitimate, potentially leading to severe consequences.


A06:2025 Insecure Design - Insecure design represents a broad category of weaknesses characterized as 'missing or ineffective control design.' It is not the root cause of all other Top Ten risk categories. It is important to distinguish between insecure design and insecure implementation. We differentiate them because they have distinct root causes, occur at different stages of the development process, and require different remediation strategies. A secure design may still contain implementation defects that lead to exploitable vulnerabilities. Conversely, an insecure design cannot be fixed by perfect implementation, as the necessary security controls were never created to defend against specific attacks. One factor contributing to insecure design is the lack of business risk profiling inherent in the software or system being developed, leading to an incorrect determination of the required security design level.


A07:2025 Authentication Failures - This vulnerability exists when an attacker successfully tricks a system into recognizing an invalid or incorrect user as legitimate.


A08:2025 Software or Data Integrity Failures - These failures relate to code and infrastructure that fails to protect against invalid or untrusted code/data being treated as trusted and valid. For example, if an application relies on plugins, libraries, or modules from untrusted sources, repositories, or content delivery networks (CDNs). An insecure CI/CD pipeline that does not employ software integrity checks can introduce risks such as unauthorized access, malicious code, or system compromise. Another example involves a CI/CD pipeline that pulls code or artifacts from untrusted locations without verifying them (e.g., checking signatures) before use.


A09:2025 Security Logging & Alerting Failures - Without proper logging and monitoring, attacks and breaches go undetected. Without effective alerting, responding quickly and efficiently to security incidents becomes extremely difficult. Insufficient logging, continuous monitoring, detection, and alerting to initiate active responses can occur at any time.


A10:2025 Mishandling of Exceptional Conditions - Mishandling exceptional conditions occurs when software fails to prevent, detect, and respond to unusual and unpredictable situations. This can lead to crashes, unexpected behavior, and sometimes vulnerabilities. This failure mode may involve one or more of the following: the application does not prevent the unusual situation, it does not identify the situation as it happens, and/or it responds poorly or not at all after the event.

We will discuss and present practical aspects of:

Broken Access Control
- Practical examples of broken access controls
- Secure access controls and best practices


Security Misconfiguration
- Real-world examples of misconfigurations
- Steps to prevent misconfiguration, including configuration management and automation tools


Cryptographic Failures
- Detailed analysis of cryptographic failures such as weak encryption algorithms or improper key management
- Importance of strong cryptographic mechanisms, secure protocols (SSL/TLS), and examples of modern cryptography in web security


Injection Attacks
- Detailed breakdown of SQL, NoSQL, OS, and LDAP injection
- Mitigation techniques using prepared statements, parameterized queries, and escaping inputs


Insecure Design
- We'll explore design flaws that can lead to vulnerabilities, like improper input validation
- We'll study strategies for secure architecture and secure design principles


Authentication Failures
- Common authentication issues
- Secure authentication strategies, like multi-factor authentication and proper session handling


Software and Data Integrity Failures
- Focus on issues like untrusted software updates and data tampering
- Safe update mechanisms and data integrity checks


Security Logging and Monitoring Failures
- Importance of logging security-relevant information and monitoring for suspicious activities
- Tools and practices for proper logging and real-time monitoring to detect breaches early

Requirements

  • A solid understanding of the web development lifecycle.
  • Prior experience in web application development and security.

Target Audience

  • Web developers
  • Technical leaders
 14 Hours

Number of participants


Price per participant

Testimonials (7)

Upcoming Courses

Related Categories