Video description
Coat your website with armor, protect yourself against the most common threats and vulnerabilities. Understand, with examples, how common security attacks work and how to mitigate them. Learn secure practices to keep your website users safe. Let's parse that. How do common security attacks work?: This course walks you through an entire range of web application security attacks, XSS, XSRF, Session Hijacking, Direct Object Reference and a whole lot more. How do we mitigate them?: Mitigating security risks is a web developer's core job. Learn by example how you can prevent script injection, use secure tokens to mitigate XSRF, manage sessions and cookies, sanitize and validate input, manage credentials safely using hashing and encryption etc. What secure practices to follow?: See what modern browsers have to offer for protection and risk mitigation, how you can limit the surface area you expose in your site.
What You Will Learn
- Understand how common web security attacks work
- Know how to write code which mitigates security risks
- Implement secure coding practices to reduce vulnerabilities
Audience
The following audience will benefit from this course: - Students who have some experience in web programming and understand basic browser concepts, students who are beginners and have never done any web programming.
About The Author
Loonycorn: Janani Ravi is a certified Google Cloud Architect and Data Engineer. She has earned her master's degree in electrical engineering from Stanford. She is currently in Loonycorn, a technical video content studio, of which she is a cofounder. Prior to co-founding Loonycorn, she worked at various leading companies, such as Google and Microsoft, for several years as a software engineer.
Table of contents
- Chapter 1 : You, This Course and Us
- Chapter 2 : What Is Security?
- Chapter 3 : Cross Site Scripting
- Chapter 4 : User Input Sanitization And Validation
- Chapter 5 : The Content Security Policy Header
- Chapter 6 : Credentials Management
- Chapter 7 : Session Management
-
Chapter 8 : SQL Injection
- Who Is Bobby Tables?
- Learn by example - how does SQLi work?
- Anatomy of a SQLi attack - unsanitized input and server errors
- Anatomy of a SQLi attack - table names and column names
- Anatomy of a SQLi attack - getting valid credentials for the site
- Types of SQL injection
- SQLi mitigation - parameterized queries and stored procedures
- SQLi mitigation - Escaping user input, least privilege, whitelist validation
- Chapter 9 : Cross Site Request Forgery
- Chapter 10 : Lot's Of Interesting Bits Of Information
- Chapter 11 : Direct Object Reference
- Chapter 12 : Iframes
- Chapter 13 : One last word
- Chapter 14 : One last word
Product information
- Title: Web Security: Common Vulnerabilities And Their Mitigation
- Author(s):
- Release date: October 2017
- Publisher(s): Packt Publishing
- ISBN: 9781788835077
You might also like
book
Web Application Security
While many resources for network and IT security are available, detailed knowledge regarding modern web application …
book
Web Application Security
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of …
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …
video
GIAC Security Essentials (GSEC)
11+ Hours of Video Instruction GIAC Security Essentials (GSEC) Complete Video Course will provide the learner …