Master web security best practices to protect applications from vulnerabilities and threats.
The practice and study of secure communication in the presence of adversaries.
The process of verifying the identity of a user, process or device.
The process of verifying what a user has access to.
A type of security vulnerability typically found in web applications that enables attackers to inject client-side scripts into web pages …
An attack that tricks the victim into submitting a malicious request.
A code injection technique that attackers can use to exploit vulnerabilities in a web application's database layer.
Occurs when a component is susceptible to attack due to an insecure configuration option.
Occurs when an application does not adequately protect sensitive information.
Application functions related to authentication and session management are often implemented incorrectly, allowing attackers to compromise passwords, keys, or session …
A type of attack against an application that parses XML input. This attack occurs when XML input containing a reference …