Video description
Coat your website with armor, protect yourself against the most common threats and vulnerabilities. Understand, with examples, how common security attacks work and how to mitigate them. Learn secure practices to keep your website users safe. Let's parse that. How do common security attacks work?: This course walks you through an entire range of web application security attacks, XSS, XSRF, Session Hijacking, Direct Object Reference and a whole lot more. How do we mitigate them?: Mitigating security risks is a web developer's core job. Learn by example how you can prevent script injection, use secure tokens to mitigate XSRF, manage sessions and cookies, sanitize and validate input, manage credentials safely using hashing and encryption etc. What secure practices to follow?: See what modern browsers have to offer for protection and risk mitigation, how you can limit the surface area you expose in your site.
What You Will Learn
- Understand how common web security attacks work
- Know how to write code which mitigates security risks
- Implement secure coding practices to reduce vulnerabilities
Audience
The following audience will benefit from this course: - Students who have some experience in web programming and understand basic browser concepts, students who are beginners and have never done any web programming.
About The Author
Loonycorn: Janani Ravi is a certified Google Cloud Architect and Data Engineer. She has earned her master's degree in electrical engineering from Stanford. She is currently in Loonycorn, a technical video content studio, of which she is a cofounder. Prior to co-founding Loonycorn, she worked at various leading companies, such as Google and Microsoft, for several years as a software engineer.
Table of contents
- Chapter 1 : You, This Course and Us
- Chapter 2 : What Is Security?
- Chapter 3 : Cross Site Scripting
- Chapter 4 : User Input Sanitization And Validation
- Chapter 5 : The Content Security Policy Header
- Chapter 6 : Credentials Management
- Chapter 7 : Session Management
-
Chapter 8 : SQL Injection
- Who Is Bobby Tables?
- Learn by example - how does SQLi work?
- Anatomy of a SQLi attack - unsanitized input and server errors
- Anatomy of a SQLi attack - table names and column names
- Anatomy of a SQLi attack - getting valid credentials for the site
- Types of SQL injection
- SQLi mitigation - parameterized queries and stored procedures
- SQLi mitigation - Escaping user input, least privilege, whitelist validation
- Chapter 9 : Cross Site Request Forgery
- Chapter 10 : Lot's Of Interesting Bits Of Information
- Chapter 11 : Direct Object Reference
- Chapter 12 : Iframes
- Chapter 13 : One last word
- Chapter 14 : One last word
Product information
- Title: Web Security: Common Vulnerabilities And Their Mitigation
- Author(s):
- Release date: October 2017
- Publisher(s): Packt Publishing
- ISBN: 9781788835077
You might also like
book
Web Application Security
While many resources for network and IT security are available, detailed knowledge regarding modern web application …
video
Cybersecurity Attacks (Red Team Activity)
Learn about the different kinds of cyber attacks and how they can be executed About This …
video
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
More than 25 Hours of Expert Video Instruction An updated edition of this video title is …
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …