Web Application Security Primer for Front-end Developers
Course Description
This course is aimed at front end web developers to help them understand the sort of threats their web applications will be exposed to. It will give an overview of security best practices along with practical demonstrations of actual threats and how to mitigate against them.
This course takes the approach that security is holistic and that all people involved should be aware of the threats.
It will cover backend, front end, database and server vulnerabilities and demonstrate real threats and their solutions. The backend and database topics will be demonstrated rather than worked through at the code level.
3 Days
Contact us for pricing
Prerequisites
This course assumes familiarity with developing web applications and is specifically aimed at front end developers who might not be involved in configuring and deploying the applications but need to be aware of the threats that web applications face.Introduction
Web Application SecurityTypes of attacks
Introducing a poorly written web application
Attack Vectors
OWASP Top TenCommon Weakness Enumeration
Common Vulnerabilities and Exposures
Cross-Site Scripting
OWASP No. 3What is XSS?
Demonstrate XSS attacks
Resolving XSS attacks
Cross-Site Request Forgery
OWASP No. 10What is XSRF?
Demonstrate an XSRF vulnerability
Resolving XSRF attacks
Injection Attacks
OWASP No. 3SQL Injection
NOSQL Injection
Parameterised queries
Entity framework considerations
Some sample attacks along with solutions
File Uploads
OWASP No. 4 & No. 5File Upload Vulnerabilities
Path traversal attacks
XML External Entity Attack
OWASP No. 5What is an XXE attack?
An example attack
C# ASP.NET solution
Authentication And Authorization
OWASP No 7 & No 2Password Strength
Encrypting passwords
Minimising access using authorization
Database credentials and read only access unless necessary
3rd party authorization
Server Side Request Forgery
OWASP No. 10What is SSRF?
Demonstrate a SSRF attack
Resolving SSRF Vulnerabilities
Meet The Hackers
Viewing web server logsThe threat landscape
Types of attack
Tools used by hackers
Setup a public server on a well-known ip address and monitor the logs
Understanding the role of network security
Security by design
Security concepts and terminology
The role of AI in Web Application Security
General Principles
Don't share unnecessary informationUse proper exception handling and custom error pages
Patch servers and other libraries
Externalise sensitive information like passwords
Use encryption
Use SSL
Sanitise all information coming from users
Monitor logs
Review code
The Human Factor
Threat Monitoring
The importance of loggingApplication logs
Network logs
Monitoring logs
Security Best Practices
Code development practicesSecurity testing strategies
Code reviews
Runtime protection for application development
Conclusions
Review of threat landscapeImportance of monitoring logs
Security checking tools and penetration testing
SecurityASP.NETC#WebCyber SecurityFront-end developers