Get in Touch

Course Outline

Part 1. Introduction

Core Concepts

  • Security Boundary
  • Sources and Sinks Metaphor
  • AppSec Kill Chain
  • Threat Modeling

Part 2. Backend

Backend Overview

  • Assets and Attack Vectors
  • Backend Threat Model

Application Boundary

  • Layer Overview
  • Authentication and Authorization
  • Session Management
  • Input Validation

Database Boundary

  • Layer Overview
  • SQL Injection
  • NoSQL Injection

Operating System Boundary

  • Layer Overview
  • Memory Safety
  • Command Injection
  • Path Traversal
  • Pros and Cons of File Uploads
  • XML External Entity (XXE) Reference
  • Deserialization

Part 3. Frontend

Frontend Overview

  • The Cookie Tragedy
  • Single-Origin Policy
  • JavaScript
  • Frontend Threat Model

Origin Boundary

  • Layer Overview
  • Cross-Site Scripting (XSS)
  • Cross-Site Request Forgery (CSRF)
  • Cross-Site Leaks
  • Other Issues

Part 4. Key Questions

How to Maintain Secrecy?

  • Secret Management
  • Sensitive Data Handling

How to Ensure Code and Data Integrity?

  • Supply Chain Attacks
  • Cache Poisoning

How to Maintain Availability?

  • The Importance of Logging
  • Self-Healing Systems
  • Disaster Recovery
  • Resilience Against Volumetric Attacks
 14 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories