Get in Touch

Course Outline

Part 1. Introduction

Core concepts

  • Security boundaries
  • Source and sink metaphors
  • AppSec kill chain
  • Threat modelling

Part 2. Backend

Backend overview

  • Assets and attack vectors
  • Backend threat model

Application boundary

  • Front-line overview
  • Authentication and authorisation
  • Session management
  • Input validation

Database boundary

  • Front-line overview
  • SQL injection
  • NoSQL injection

Operating system boundary

  • Front-line overview
  • Memory safety
  • Command injection
  • Path traversal
  • Highlights and pitfalls of file uploads
  • XML external entity reference
  • Deserialisation

Part 3. Frontend

Frontend overview

  • The tragedy of cookies
  • Same-Origin Policy
  • JavaScript
  • Frontend threat model

Origin boundary

  • Front-line overview
  • Cross-site scripting
  • Cross-site request forgery
  • Cross-site leaks
  • Other issues

Part 4. Big Questions

How to keep secrets?

  • Secret management
  • Sensitive data management

How to ensure code and data integrity?

  • Supply chain attacks
  • Cache poisoning

How to maintain availability?

  • The importance of keeping logs
  • Self-healing systems
  • Disaster recovery
  • Surviving volumetric attacks
 14 Hours

Number of participants


Price per participant

Testimonials (3)

Provisional Upcoming Courses (Require 5+ participants)

Related Categories