Module 1 : Introduction to Web Application
security
- Introduction to Web Applications.
- Understanding Web Application Architecture.
- HTTP Protocol Basics.
- HTTP Attack Vectors
- HTTPS vs HTTP.
- Introduction to VAPT.
- Introduction to Application Security.
- Application Security Risks.
- Case Studies.
Module 2 : OWASP Top 10
-
• Global Standards/Frameworks.
- SANS Top 25 Software Errors
- WASC
- NIST
- OWASP
- • What is OWASP.
- • Significant OWASP Projects.
- • OWASP Top 10
-
• The ‘OWASP Top 10’ for WebAppSec.
- A1-Injection
- A2-Broken Authentication
- A3-Sensitive Data Exposure
- A4-XML External Entities (XXE)
- A5-Broken Access Control
- A6-Security Misconfiguration
- A7-Cross-Site Scripting (XSS)
- A8-Insecure Deserialization
-
A9-Using Components with Known Vulnerabilities
- A10- Insufficient Logging & Monitoring
- • Mitigations of OWASP Top 10.
Module 3 : Modern Attacks of Web Application
-
• CSRF
- Understanding the vulnerability
- Discovering the vulnerability
- Attacking the Issue
- Impact & Countermeasure
-
• SSRF
- Understanding the vulnerability
- Discovering the vulnerability
- Attacking the Issue
- Impact & Countermeasure
-
• Clickjacking
- Understanding the vulnerability
- Discovering the vulnerability
- Attacking the Issue
- Impact & Countermeasure
-
• SSTI
- Understanding the vulnerability
- Discovering the vulnerability
- Attacking the Issue
- Impact & Countermeasure
-
• XXE
- Understanding the vulnerability
- Discovering the vulnerability
- Attacking the Issue
- Impact & Countermeasure
Module 4 : Automated approach of
Vulnerability Assessment
-
• Web Application Scanners.
- Netsparker
- Nessus
- Acunetix
- AppScan
- WebInspect
- NeXpose
- • Profiling the Scans
- • Interpreting Scanner Reports
-
• Open source Tools and Testing Methodologies
Module 5 : API security Testing
-
• API Security
- Introduction to API & API Security
- SOAP vs REST
- Case Studies
- Common API Vulnerabilities
- • Core Toolset for API Testing
- • Attacks on API
- • API Assessment Approach
- • Bot Defense for API
- • How to stop API Attacks?
Module 6 : Mitigation Strategy for Web
Application loopholes
- • Common Mistakes in Development
-
• Security Best Practices for Web Application & API
Security
-
• Secure SDLC
- Threat Modelling
- Source Code Review
- VAPT
- • Cloud Security
Module 7 : Cloud Introduction
- • Introduction to cloud
- • Introduction to virtualization
- • Cloud Service Models
- • Cloud Industry Standards
- • Security Challenges
- • Introduction to Cloud Vendors (Aws & Azure)
- • Cloud Access Security Broker
Module 8 : Cloud Migration Challenges
- • Cloud Breach Case Study
- • Virtualization security Issues
- • Risk Assessment on Cloud Migration
- • OWASP Top 10 Threats
- • Planning Secure Migration
Module 9 : Cloud Infrastructure Security
- • Cloud Configuration & Patch Management
- • Cloud Change management
-
• Cloud Infrastructure Audit (Intro, Audit, Best
Practice)
- Aws – VPC, EC2
- Azure - ARM, NSG
-
• Demo- Aws cli & powershell &
Amazon, Azure portal
Module 10 : Cloud Data Security
- • Data Protection (rest, at transit, in use)
- • Data Information lifecycle
-
• Cloud Data Audit (Intro, Audit, Best Practice)
- Aws – EBS, S3
- Azure – SAS
-
• Demo- Aws cli & powershell &
Amazon, Azure portal
- • Key management
-
• Cloud Key management Audit (Intro, Audit, Best
Practice)
- Aws –KMS
- Azure – Azure Key Vault
-
• Demo- Aws cli & powershell &
Amazon, Azure portal
Module 11 : Identity and Access Management
-
• Introduction to Identity and Access Management
- • Introduction to Federated Identity Management
- • Case Study
-
• Cloud IAM Audit (Intro, Audit, Best Practice)
-
• Demo- Aws Cli & Amazon portal
Module 12 : Cloud Application Security
- • Cloud Application Challenges
- • OWSAP Top 10
- • Secure SDLC
- • DevSecOps
- • Introduction to Cloud watch, Cloud Trail
-
• Security automation – Cloud Trail, Cloud watch,
Lambda