Defending Web Applications Security Essentials

Provided by

Enquire about this course

About the course

Contents
Instructor: Dr. Johannes Ullrich
6,275 EUR 6,025 EUR paid by May 15

GWEB Certification
Affiliate Pricing
36 CPEs
Laptop Required
Masters Program

This is the course to take if you have to defend web applications!

The quantity and importance of data entrusted to web applications is growing, and defenders need to learn how to secure them. Traditional network defenses, such as firewalls, fail to secure web applications. DEV522 covers the OWASP Top 10 Risks and will help you better understand web application vulnerabilities, thus enabling you to properly defend your organization's web assets.

Mitigation strategies from an infrastructure, architecture, and coding perspective will be discussed alongside real-world applications that have been proven to work. The testing aspect of vulnerabilities will also be covered so that you can ensure your application is tested for the vulnerabilities discussed in class.

To maximize the benefit for a wider range of audiences, the discussions in this course will be programming language agnostic. Focus will be maintained on security strategies rather than coding-level implementation.

DEV522: Defending Web Applications Security Essentials is intended for anyone tasked with implementing, managing, or protecting Web applications. It is particularly well suited to application security analysts, developers, application architects, pen testers, auditors who are interested in recommending proper mitigations for web security issues, and infrastructure security professionals who have an interest in better defending their web applications.

The course will also cover additional issues the authors have found to be important in their day-to-day web application development practices. The topics that will be covered include:

Infrastructure security
Server configuration
Authentication mechanisms
Application language configuration
Application coding errors like SQL injection and cross-site scripting
Cross-site request forging
Authentication bypass
Web services and related flaws
Web 2.0 and its use of web services
XPATH and XQUERY languages and injection
Business logic flaws
Protective HTTP headers

The course will make heavy use of hands-on exercises and concludes with a large defensive exercise that reinforces the lessons learned throughout the week.

You Will Learn:

How to comprehensively remediate common web application vulnerabilities.


How to apply defensive application design and coding practices to avoid security vulnerabilities.


The HTTP protocol and new technologies such as SPDY and Websockets that affect the protocol stack.


How to move away from basic web application security principles of "validating more" and implement effective security controls against vulnerabilities that input validation simply does not fix.


How to customize, implement, and maintain a baseline security standard for the web applications development lifecycle (SANS SWAT checklist), improving security and reducing exposure to common vulnerabilities such as the OWASP Top 10 Risks.


How to leverage HTTP header-level protection to apply strong defense systems on the client side by building another layer of defense on top of secure coding on the server side.


How to design better and stronger security architecture that includes infrastructure aspects in the design process.


How to understand cutting-edge web technologies (such as HTML5) and their security implications, avoiding security issues when utilizing these newer technologies.

Course Syllabus
  DEV522.1: Web Basics and Authentication Security
  DEV522.2: Web Application Common Vulnerabilities and Mitigations
  DEV522.3: Proactive Defense and Operation Security
  DEV522.4: AJAX and Web Services Security
  DEV522.5: Cutting-Edge Web Security
  DEV522.6: Capture and Defend the Flag Exercise

Enquire

Start date Location / delivery
01 Jul 2019 Munich, Germany

Related article

As we become more reliant on digital technologies, the cyber security industry has grown in order to protect organisations against online attacks. ...