YoVDO

Web Security

Offered By: Frontend Masters

Tags

Web Development Courses Cybersecurity Courses Cross-Site Request Forgery (CSRF) Courses Clickjacking Courses Web Security Courses Man in The Middle Attacks Courses

Course Description

Overview

Websites are hacked every day at an alarmingly increasing rate. In this course Mike North shows you many kinds of threats developers are up against. You’ll stage your own mock attacks and get practice securing and defending against attacks. You'll learn to test security like an attacker and defend against XSS attacks, man-in-the-middle attacks, 3rd party asset injection attacks and more!

Syllabus

  • Introduction
  • Course Demo Application
  • Types of Hackers
  • Hacker Motives
  • Course Agenda
  • Introducing Cross-Site Scripting (XSS)
  • Types of XSS Attacks
  • Locations for XSS Attacks
  • XSS Attack Demonstration
  • Prevent XSS Attacks Quiz
  • Challenge 1: XSS Attack
  • Challenge 1: Solution
  • User Data
  • Sanitizing User Data
  • Content Security Policy (CSP)
  • Challenge 2: Defend Against XSS Attacks
  • Challenge 2: Solution, Part 1
  • Challenge 2: Solution, Part 2
  • Malicious Attachments
  • Challenge 3: XSS Attachment
  • Challenge 3: Solution
  • Stopping Malicious Attachments
  • Introducing Cross-Site Request Forgery (CSRF)
  • Challenge 4: CSRF
  • Challenge 4: Solution
  • CSRF Tokens
  • Request Origin
  • Cross-Origin Resource Sharing (CORS)
  • Challenge: 5: Defend Against CSRF
  • Challenge: 5: Solution
  • Introducing Clickjacking
  • Challenge 6: Clickjacking
  • Challenge 6: Solution
  • Stopping Clickjacking
  • Challenge 7: Defend Against Clickjacking
  • Challenge 7: Solution
  • Introducing Third Party Assets
  • Challenge 8: Subresource Integrity
  • Challenge 8: Solution
  • Introducing Man-in-the-Middle Attacks
  • Hardware
  • Encrypting Data
  • Introducing HTTPS
  • HTTPS & Cryptography
  • TLS Handshake
  • OpenSSL
  • Challenge 9: Defend Against Man-in-the-Middle Attack
  • Challenge 9: Solution
  • Introducing HTTPS Downgrade
  • Defending Against HTTPS Downgrade
  • Bad Certificate
  • Defending Against Bad Certificates
  • Challenge & Solution 10: Defend Against HTTPS Downgrade
  • Certificate Authority Compromise
  • Wrapping Up Web Security

Taught by

Mike North

Related Courses

Software as a Service
University of California, Berkeley via Coursera
Intro to Computer Science
University of Virginia via Udacity
Web Development
Udacity
Software Engineering for SaaS
University of California, Berkeley via Coursera
CS50's Introduction to Computer Science
Harvard University via edX