YoVDO

Web Security

Offered By: Frontend Masters

Tags

Web Development Courses Cybersecurity Courses Cross-Site Request Forgery (CSRF) Courses Clickjacking Courses Web Security Courses Man in The Middle Attacks Courses

Course Description

Overview

Websites are hacked every day at an alarmingly increasing rate. In this course Mike North shows you many kinds of threats developers are up against. You’ll stage your own mock attacks and get practice securing and defending against attacks. You'll learn to test security like an attacker and defend against XSS attacks, man-in-the-middle attacks, 3rd party asset injection attacks and more!

Syllabus

  • Introduction
  • Course Demo Application
  • Types of Hackers
  • Hacker Motives
  • Course Agenda
  • Introducing Cross-Site Scripting (XSS)
  • Types of XSS Attacks
  • Locations for XSS Attacks
  • XSS Attack Demonstration
  • Prevent XSS Attacks Quiz
  • Challenge 1: XSS Attack
  • Challenge 1: Solution
  • User Data
  • Sanitizing User Data
  • Content Security Policy (CSP)
  • Challenge 2: Defend Against XSS Attacks
  • Challenge 2: Solution, Part 1
  • Challenge 2: Solution, Part 2
  • Malicious Attachments
  • Challenge 3: XSS Attachment
  • Challenge 3: Solution
  • Stopping Malicious Attachments
  • Introducing Cross-Site Request Forgery (CSRF)
  • Challenge 4: CSRF
  • Challenge 4: Solution
  • CSRF Tokens
  • Request Origin
  • Cross-Origin Resource Sharing (CORS)
  • Challenge: 5: Defend Against CSRF
  • Challenge: 5: Solution
  • Introducing Clickjacking
  • Challenge 6: Clickjacking
  • Challenge 6: Solution
  • Stopping Clickjacking
  • Challenge 7: Defend Against Clickjacking
  • Challenge 7: Solution
  • Introducing Third Party Assets
  • Challenge 8: Subresource Integrity
  • Challenge 8: Solution
  • Introducing Man-in-the-Middle Attacks
  • Hardware
  • Encrypting Data
  • Introducing HTTPS
  • HTTPS & Cryptography
  • TLS Handshake
  • OpenSSL
  • Challenge 9: Defend Against Man-in-the-Middle Attack
  • Challenge 9: Solution
  • Introducing HTTPS Downgrade
  • Defending Against HTTPS Downgrade
  • Bad Certificate
  • Defending Against Bad Certificates
  • Challenge & Solution 10: Defend Against HTTPS Downgrade
  • Certificate Authority Compromise
  • Wrapping Up Web Security

Taught by

Mike North

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network