(Click Category to List Courses)
42 - IT-S Information Technology - Security and Audit
IT-S 140 - DOJO: Web Application Security Implementation
Code | Start Date | Duration | Venue | |
---|---|---|---|---|
IT-S 140 | 18 December 2023 | 5 Days | Istanbul | Registration Form Link |
IT-S 140 | 15 January 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 140 | 12 February 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 140 | 11 March 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 140 | 22 April 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 140 | 06 May 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 140 | 03 June 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 140 | 29 July 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 140 | 26 August 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 140 | 23 September 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 140 | 21 October 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 140 | 18 November 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 140 | 16 December 2024 | 5 Days | Istanbul | Registration Form Link |
Course Description
One of the main concerns for many companies and internet users around the world is security. This is getting harder to achieve everyday with attacks getting more and more sophisticated. One of the ways for everyday users and beginning professionals to protect their content is Web Security Dojo. Dojo is designed to provide practical, hands-on exercises on web security and intrusion techniques.
Course Objectives
- Understand how HTTP comunication works
- Gain knowledge of Web vulnearabilities
- Learn common web security testing tools
Who Should Attend?
- Network administrators
- Database administrators
- Ethical Hackers and Penetration Testers
- IT managers
- Anyone who deal directly or indirectly with IT
Course Details/Schedule
Day 1
- Web fundamentals and security configurations
- Introduction to HTTP protocol
- Overview of web authentication technologies
- Web application architecture
- Recent attack trends
- Web infrastructure security/Web application firewalls Managing configurations for web apps
Day 2
- Defense against input related threats
- Input-related vulnerabilities in web applications
- SQL injection
- Cross-site request forgery
- Cross-site scripting vulnerability and defenses
- Unicode handling strategy
- File upload handling
- Business logic and concurrency
Day 3
- Web application authentication and authorization
- Authentication vulnerabilities and defense
- Multifactor authentication
- Session vulnerabilities and testing
- Authorization vulnerabilities and defense
- SSL vulnerabilities and testing
- Proper encryption use in web application
Day 4
- Web services and front-end security
- Honeytoken
- Web services overview
- Security in parsing of XML
- XML security
- AJAX technologies overview
- AJAX attack trends and common attacks
- REST security
- Browser-based defense such as Content Security Policy
Day 5
- Cutting-edge web security
- Serialization security
- Clickjacking
- DNS rebinding
- HTML5 security
- Logging collection and analysis for web apps
- Security testing
- IPv6 impact on web security
- Capture-and-defend-the-flag exercise
- Mitigating server configuration errors
- Discovering and mitigating coding problems
- Testing business logic issues and fixing problems
- Testing web services and mitigating security problems