Web Security

Master web security best practices to protect applications from vulnerabilities and threats.

What you'll learn

10 Sections
49 Tutorials
49 Core Concepts

Available Sections

Cryptography

The practice and study of secure communication in the presence of adversaries.

5 tutorials 5 concepts
Start Learning

Authentication

The process of verifying the identity of a user, process or device.

5 tutorials 5 concepts
Start Learning

Authorization

The process of verifying what a user has access to.

5 tutorials 5 concepts
Start Learning

Cross-Site Scripting (XSS)

A type of security vulnerability typically found in web applications that enables attackers to inject client-side scripts into web pages …

5 tutorials 5 concepts
Start Learning

Cross-Site Request Forgery (CSRF)

An attack that tricks the victim into submitting a malicious request.

4 tutorials 4 concepts
Start Learning

SQL Injection

A code injection technique that attackers can use to exploit vulnerabilities in a web application's database layer.

5 tutorials 5 concepts
Start Learning

Security Misconfigurations

Occurs when a component is susceptible to attack due to an insecure configuration option.

5 tutorials 5 concepts
Start Learning

Sensitive Data Exposure

Occurs when an application does not adequately protect sensitive information.

5 tutorials 5 concepts
Start Learning

Broken Authentication and Session Management

Application functions related to authentication and session management are often implemented incorrectly, allowing attackers to compromise passwords, keys, or session …

5 tutorials 5 concepts
Start Learning

XML External Entity (XXE) Attacks

A type of attack against an application that parses XML input. This attack occurs when XML input containing a reference …

5 tutorials 5 concepts
Start Learning