Web Security: Common Vulnerabilities And Their Mitigation

Web Security: Common Vulnerabilities And Their Mitigation

$39 $10

A guide to dealing with XSS, session hijacking, XSRF, credential management, SQLi and a whole lot more

Product Description

Coat your website with armor, protect yourself against the most common threats and vulnerabilities. Understand, with examples, how common security attacks work and how to mitigate them. Learn secure practices to keep your website users safe.

Let’s parse that.

  • How do common security attacks work?: This course walks you through an entire range of web application security attacks, XSS, XSRF, Session Hijacking, Direct Object Reference and a whole lot more.
  • How do we mitigate them?: Mitigating security risks is a web developer’s core job. Learn by example how you can prevent script injection, use secure tokens to mitigate XSRF, manage sessions and cookies, sanitize and validate input, manage credentials safely using hashing and encryption etc.
  • What secure practices to follow?: See what modern browsers have to offer for protection and risk mitigation, how you can limit the surface area you expose in your site.

What’s included in this course:

  • Security attacks such as Cross Site Scripting, Session Hijacking, Credential Management, Cross Site Request Forgery, SQL Injection, Direct Object Reference, Social Engineering
  • Risk mitigation using the Content Security Policy Header, user input validation and sanitization, secure token validation, sandboxed iframes, secure sessions and expiry, password recovery
  • Web security basics: Two factor authentication, Open Web Application Security Project,

What am I going to get from this course?

Understand how common web security attacks work
Know how to write code which mitigates security risks
Implement secure coding practices to reduce vulnerabilities

What is the target audience?

Yep! Students who have some experience in web programming and understand basic browser concepts
Nope! Students who are beginners and have never done any web programming


  • M1 - You This Course and Us
  • M2 - Security and its building blocks
  • M2 - Security related definitions and categories
  • M3 - What is XSS?
  • M3 - Learn by example - how does a XSS attack work?
  • M3 - Types of XSS
  • M3 - XSS mitigation and prevention
  • M4 - Sanitizing input
  • M4 - Sanitizing input - still not done
  • M4 - Validating input
  • M4 - Validating input - some more stuff to say
  • M4 - Client Side Encoding Blacklisting and Whitelisting inputs
  • M5 - Rules for the browser
  • M5 - Default directives and wildcards
  • M5 - Stay away from inline code and the eval() function
  • M5 - The nonce attribute and the script hash
  • M6 - Broken authentication and session management
  • M6 - All about passwords - Strength, Use and Transit
  • M6 - All about passwords Storage
  • M6 - Learn by example - login authentication
  • M6 - A little bit about hashing
  • M6 - All about passwords Recovery
  • M7 - What is a session?
  • M7 - Anatomy of a session attack
  • M7 - Session hijacking - count the ways
  • M7 - Learn by example - sessions without cookies
  • M7 - Session ids using hidden form fields and cookies
  • M7 - Session hijacking using session fixation
  • M7 - Session hijacking counter measures
  • M7 - Session hijacking sidejacking XSS and malware
  • M8 - Who Is Bobby Tables?
  • M8 - Learn by example - how does SQLi work?
  • M8 - Anatomy of a SQLi attack - unsanitized input and server errors
  • M8 - Anatomy of a SQLi attack - table names and column names
  • M8 - Anatomy of a SQLi attack - getting valid credentials for the site
  • M8 - Types of SQL injection
  • M8 - SQLi mitigation - parameterized queries and stored procedures
  • M8 - SQLi mitigation - Escaping user input least privilege whitelist validation
  • M9 - What is XSRF?
  • M9 - Learn by example - XSRF with GET and POST parameters
  • M9 - XSRF mitigation - The referer origin header and the challenge response
  • M9 - XSRF mitigation - The synchronizer token
  • M10 - The Open Web Application Security Project Preview
  • M10 - 2 factor authentications and OTPs
  • M10 - Social Engineering
  • M11 - The direct object reference attack - do not leak implementation details
  • M11 - Direct object reference mitigations
  • M12 - IFrames come with their own security concerns
  • M12 - Sandboxing iframes
  • M13 - Wrapping up the OWASP top 10 list
  • M14 - Installing PHP (Windows)
  • M14 - Enabling MySQL and using phpmyadmin (Windows)
  • M14 - Installing PHP (Mac)
  • M14 - Installing MySQL (Mac)
  • M14 - Using MySQL Workbench (Mac)
  • M14 - Getting PHP and MySQL to talk to each other (Mac)

Course Requirements

A basic understanding of how the web browser, rendering, headers, cookies and sessions

A basic understanding of Javascript and PHP to follow the examples

Hurry up! The price rises inRefreshing countdownClose Countdown


Register | Lost your password?