Get in Touch

Course Outline

Part 1. Introduction

Fundamental Concepts

  • Security boundary
  • Sources and sinks metaphor
  • AppSec kill chain
  • Threat modeling

Part 2. Backend

Backend Overview

  • Assets and attack vectors
  • Backend threat model

Application Boundary

  • Layer overview
  • Authentication and authorization
  • Session management
  • Input validation

Database Boundary

  • Layer overview
  • SQL injection
  • NoSQL injection

Operating System Boundary

  • Layer overview
  • Memory security
  • Command injection
  • Path traversal
  • The good, the bad, and the ugly of file uploads
  • XML external entity reference
  • Deserialization

Part 3. Frontend

Frontend Overview

  • The cookie tragedy
  • Same-Origin Policy
  • JavaScript
  • Frontend threat model

Origin Boundary

  • Layer overview
  • Cross-site scripting
  • Cross-site request forgery
  • Cross-site leaks
  • Other issues

Part 4. Big Questions

How to maintain secrecy?

  • Secret management
  • Handling sensitive data

How to ensure code and data integrity?

  • Supply chain attacks
  • Cache poisoning

How to maintain availability?

  • On the importance of keeping a journal
  • Self-healing systems
  • Disaster recovery
  • Surviving volumetric attacks
 14 Hours

Custom Corporate Training

Training solutions designed exclusively for businesses.

  • Customized Content: We adapt the syllabus and practical exercises to the real goals and needs of your project.
  • Flexible Schedule: Dates and times adapted to your team's agenda.
  • Format: Online (live), In-company (at your offices), or Hybrid.
Investment

Price per private group, online live training, starting from 2600 € + VAT*

Contact us for an exact quote and to hear our latest promotions

Testimonials (3)

Provisional Upcoming Courses (Contact Us For More Information)

Related Categories