Web Application Security Testing

SEC-134 (3 Days)

Request Pricing

Security Training Overview

This Web Application Security Testing training teaches software testers how to plan and execute security tests, as well as how to select and use the most appropriate tools and techniques to find even hidden security flaws. Attendees learn essential, practical skills that can be applied immediately in the workplace.

Location and Pricing

Most Accelebrate courses are delivered as private, customized, on-site training at our clients' locations worldwide for groups of 3 or more attendees and are custom tailored to their specific needs. Please visit our client list to see organizations for whom we have delivered private in-house training. These courses can also be delivered as live, private online classes for groups that are geographically dispersed or wish to save on the instructor's or students' travel expenses. To receive a customized proposal and price quote for private training at your site or online, please contact us.

Security Training Objectives

All students will:

  • Understand basic concepts of security, IT security and secure coding
  • Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
  • Learn about XML security
  • Learn client-side vulnerabilities and secure coding practices
  • Understand security concepts of Web services
  • Learn about JSON security
  • Learn about denial of service attacks and protections
  • Understand security testing approaches and methodologies
  • Get practical knowledge in using security testing techniques and tools
  • Get sources and further readings on secure coding practices

Security Training Outline

Expand All | Collapse All | Printer-Friendly

Introduction
IT Security and Secure Coding
  • Nature of security
  • What is risk?
  • IT security vs. secure coding
  • From vulnerabilities to botnets and cybercrime
    • Nature of security flaws
    • Reasons for difficulty
    • From an infected computer to targeted attacks
  • Classification of security flaws
    • Landwehr’s taxonomy
    • The Seven Pernicious Kingdoms
    • OWASP Top Ten 2017
Web Application Security (OWASP Top Ten 2017)
  • Injection
    • Injection principles
    • SQL injection
    • Other injection flaws
  • Broken authentication
    • Session handling threats
    • Session handling best practices
    • Setting cookie attributes – best practices
    • Session management testing
    • Session ID predictability and randomness
    • Testing session properties
    • Cross-site request forgery (CSRF)
  • Sensitive data exposure
    • Sensitive data exposure
    • Transport layer security
  • XML external entity (XXE)
    • XML Entity introduction
    • XML external entity attack (XXE) – resource inclusion
    • XML external entity attack – URL invocation
    • XML external entity attack – parameter entities
    • Case study – XXE in Google Toolbar
  • Broken access control
    • Typical access control weaknesses
    • Insecure direct object reference (IDOR)
    • Protection against IDOR
    • Testing for insecure direct object reference
    • Testing for insecure direct object references
    • Case study – Facebook Notes
  • Security misconfiguration
    • Configuring the environment
    • Insecure file uploads
    • Filtering file uploads – validation and configuration
  • Cross-Site Scripting (XSS)
    • Persistent XSS
    • Reflected XSS
    • DOM-based XSS
    • Exploitation: CSS injection
    • Exploitation: injecting the tag
    • XSS prevention
    • Detecting XSS vulnerabilities
    • Bypassing XSS filters
  • Insecure deserialization
    • Deserialization basics
    • Security challenges of deserialization
    • Issues with deserialization – JSON
  • Using components with known vulnerabilities
    • Vulnerability attributes
    • Common Vulnerability Scoring System – CVSS
  • Insufficient logging and monitoring
    • Detection and response
    • Logging and log analysis
    • Intrusion detection systems and Web application firewalls
Client-Side Security
  • JavaScript security
  • Same Origin Policy
  • Cross-Origin Resource Sharing (CORS)
  • Client-side authentication and password management
  • Protecting JavaScript code
  • Clickjacking
    • Clickjacking
    • Protection against Clickjacking
    • Anti-frame-busting – dismissing protection scripts
    • Protection against busting frame busting
  • AJAX security
    • XSS in AJAX
    • Script injection attack in AJAX
    • XSS protection in Ajax
    • CSRF protection in AJAX
  • HTML5 security
    • New XSS possibilities in HTML5
    • HTML5 clickjacking attack – text field injection
    • HTML5 clickjacking – content extraction
    • Form tampering
    • Cross-origin requests
    • HTML proxy with cross-origin request
  • XML security
    • Introduction
    • XML parsing
    • XML injection
  • JSON security
    • JSON parsing
    • Embedding JSON server-side
    • JSON injection
    • JSON hijacking
    • Case study – XSS via spoofed JSON element
Denial of Service
  • DoS introduction
  • Asymmetric DoS
  • SSL/TLS renegotiation DoS
  • Asymmetric DOS with JSON deserialization
  • Regular expression DoS (ReDoS)
    • ReDoS mitigation
    • Case study – ReDos in Stack Exchange
  • Hashtable collision attack
    • Using hashtables to store inputs
    • Hashtable collision
    • Hashtable collision in Java
Security Testing
  • Functional testing vs. security testing
  • Security vulnerabilities
  • Prioritization – risk analysis
  • Security in the SDLC
  • Security assessments in various SDLC phases
  • Security testing methodology
    • Steps of test planning (risk analysis)
    • Scoping and information gathering
    • Threat modeling
    • Testing steps
Security Testing Techniques and Tools
  • General testing approaches
  • Source code review
    • Code review for software security
    • Taint analysis
    • Heuristic-based
    • Static code analysis
  • Testing the implementation
    • Dynamic security testing
    • Manual vs. automated security testing
    • Penetration testing
    • Stress tests
    • Proxy servers and sniffers
    • Web vulnerability scanners
Knowledge Sources
  • Secure coding sources – a starter kit
  • Vulnerability databases
Conclusion
Request Pricing

Lecture percentage

50%

Lecture/Demo

Lab percentage

50%

Lab

Course Number:

SEC-134

Duration:

3 Days

Prerequisites:

Students must have general web application development and testing experience.

Training Materials:

All Security Training attendees receive comprehensive courseware.

Software Requirements:

Accelebrate can either provide a VMware virtual machine that can be run locally for the training or can provide access to a preconfigured cloud environment for each participant. Please contact us for details.

Contact Us:

Accelebrate’s training classes are available for private groups of 3 or more people at your site or online anywhere worldwide.

Don't settle for a "one size fits all" public class! Have Accelebrate deliver exactly the training you want, privately at your site or online, for less than the cost of a public class.

For pricing and to learn more, please contact us.

Contact Us Train For Us

Toll-free in US/Canada:
877 849 1850
International:
+1 678 648 3113

Toll-free in US/Canada:
866 566 1228
International:
+1 404 420 2491

925B Peachtree Street, NE
PMB 378
Atlanta, GA 30309-3918
USA

Subscribe to our Newsletter:

Never miss the latest news and information from Accelebrate:

Microsoft Gold Partner

Please see our complete list of
Microsoft Official Courses

Recent Training Locations

Alabama

Huntsville

Montgomery

Birmingham

Alaska

Anchorage

Arizona

Phoenix

Tucson

Arkansas

Fayetteville

Little Rock

California

San Francisco

Oakland

San Jose

Orange County

Los Angeles

Sacramento

San Diego

Colorado

Denver

Boulder

Colorado Springs

Connecticut

Hartford

DC

Washington

Florida

Fort Lauderdale

Miami

Jacksonville

Orlando

Saint Petersburg

Tampa

Georgia

Atlanta

Augusta

Savannah

Idaho

Boise

Illinois

Chicago

Indiana

Indianapolis

Iowa

Ceder Rapids

Des Moines

Kansas

Wichita

Kentucky

Lexington

Louisville

Louisiana

Banton Rouge

New Orleans

Maine

Portland

Maryland

Annapolis

Baltimore

Hagerstown

Frederick

Massachusetts

Springfield

Boston

Cambridge

Michigan

Ann Arbor

Detroit

Grand Rapids

Minnesota

Saint Paul

Minneapolis

Mississippi

Jackson

Missouri

Kansas City

St. Louis

Nebraska

Lincoln

Omaha

Nevada

Reno

Las Vegas

New Jersey

Princeton

New Mexico

Albuquerque

New York

Buffalo

Albany

White Plains

New York City

North Carolina

Charlotte

Durham

Raleigh

Ohio

Canton

Akron

Cincinnati

Cleveland

Columbus

Dayton

Oklahoma

Tulsa

Oklahoma City

Oregon

Portland

Pennsylvania

Pittsburgh

Philadelphia

Rhode Island

Providence

South Carolina

Columbia

Charleston

Spartanburg

Greenville

Tennessee

Memphis

Nashville

Knoxville

Texas

Dallas

El Paso

Houston

San Antonio

Austin

Utah

Salt Lake City

Virginia

Richmond

Alexandria

Arlington

Washington

Tacoma

Seattle

West Virginia

Charleston

Wisconsin

Madison

Milwaukee

Alberta

Edmonton

Calgary

British Columbia

Vancouver

Nova Scotia

Halifax

Ontario

Ottawa

Toronto

Quebec

Montreal

Puerto Rico

San Juan

© 2013-2019 Accelebrate, Inc. All Rights Reserved. All trademarks are owned by their respective owners.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.