Play by Play: Website Security Review with Troy Hunt and Lars Klint
Learn to assess the security profile of your own web applications and identify security risks before attackers do.
What you'll learn
Frequently, the first thing a developer knows of a serious security flaw in their application is when it’s too late and it’s already been exploited. There’s a broad range of security risks and corresponding mitigations within web applications and it’s absolutely essential that developers learn how to identify these themselves. This course walks through a typical security review of an established web application and identifies which practices have been done well and then which ones could be improved. It’s a technology agnostic course – it doesn’t matter whether you work in ASP.NET or Node or PHP, this is all about the web and applies equally to all apps that run in the browser.
Table of contents
- Introduction 1m
- About the App - "Falling Into the Pit of Success" 2m
- Account Management 3m
- Security in a Box... Not 3m
- HTTP: Start There and Stay There 1m
- Grading Your HTTPS Configuration 2m
- HTTP Strict Transport Security 4m
- Preventing Account Enumeration 7m
- Brute Force Attacks, Throttling, and Account Lockout 7m
- Third-party Identity Providers 1m
- Password Strength 2m
- Password Validation 5m
- Anti-automation (AKA Captcha) 5m
- Multiple Simultaneous Logins 5m
- Summary 1m
- The OWASP Top 10 5m
- Injection 5m
- Broken Authentication and Session Management 12m
- Cross-Site Scripting (XSS) 12m
- Insecure Direct Object References 5m
- Overlay Information Response Headers 4m
- X-Frame-Options 3m
- Cross-Site Request Forgery (CSRF) 4m
- Automated Security Scanning 4m
- Final Thoughts/Conclusion 1m