Secure Programming of Web Applications for Developers and TPMs - Start

Web Application Security for Software Developers and Technical Project Managers

Understand Application Security: Numerous successful attacks on well-known web applications on a weekly basis should be reason enough to study the background of "Web Application Security" of custom-made or self-developed applications.

Computer systems are ubiquitous and part of our working and private everyday life. For companies it is increasingly complex and difficult to keep up their IT security with the current technical progress. Large enterprises establish security processes which are created according to industry standards (e.g., ISO 27001). These processes are very complex and can only be implemented by teams of security experts. Constant quality assurance, maintenance and adaptation also belong to an IT security process.

It does not matter if a company develops products or runs an online shop, IT security is a characteristic feature. Security incidents, which maybe even reach public uncontrolled, do not only damage the business image but may also lead to legal or financial consequences.

In this course, you will see...

  • Introduction to secure coding/programming
  • Common vulnerabilities
  • Security specifically of web applications
  • Security baselines
  • Secure programming patterns / defensive programming techniques
  • Robust and secure coding practices
  • Attack demos
  • Relevant for: Web Development, Web applications, Cloud services, Web services

Instructions

Use the player controls to play the HD video content in full screen mode and to activate subtitles.

This is only an abridged excerpt from the course
Secure Programming of Web Applications for Developers and TPMs

Chapters

Number Title Length
Start
1 Introduction and Motivation (Full preview availabe) 2 min
2 Well-known Vulnerabilities Overview (Full preview availabe) 2 min
3 Causes & Background 9 min
4 Secure Programming in general 3 min
5 BankBoard Intro – A vulnerable Java Web Application 3 min
6 Code/Command Injection 3 min
7 (No)SQL Code Injection (Full preview availabe) 4 min
8 DEMO: BankBoard SQL Code Injection (Full preview availabe) 2 min
9 Cross-Site Request Forgery (CSRF) 5 min
10 DEMO: CSRF 2 min
11 Cross-Site Scripting (XSS) 5 min
12 DEMO: Simple XSS 2 min
13 Open Redirection 4 min
14 File Inclusion / Directory Traversal 4 min
15 Clickjacking 4 min
16 Session-Hijacking 7 min
17 DEMO: XSS with Session-Hijacking 2 min
18 Information Disclosure 3 min
19 Authentication 7 min
20 Denial of Service 4 min
21 Middleware 1 min
22 Third-Party Software 1 min
23 Conclusion & Summary 3 min
A1 [Appendix] Java Coding Example - Secure Password Hashing/PBKDF2 18 min
Course Assessment