Please note that this list of topics is based on our standard course offering, evolved from typical industry uses and trends. We'll work with you to tune this course and level of coverage to target the skills you need most. Topics, agenda and labs are subject to change, and may adjust during live delivery based on audience interests and skill-level.
Session: STIG Foundation
Lesson: DISA's Security Technical Implementation Guides (STIGs)
- The motivations behind STIGs
- Requirements that the various software development roles must meet
- Implementing STIG requirements and guidelines
Lesson: Why Hunt Bugs?
- The Language of Cybersecurity
- The Changing Cybersecurity Landscape
- The Human Perimeter
- Starting Point for ALL Security Analysis of Web Applications
- Lab: Case Study in Failure
Lesson: Safe and Appropriate Bug Hunting/Hacking
- Warning to All Bug Hunters
- Working Ethically
- Respecting Privacy
- Bug/Defect Notification
- Bug Hunting Pitfalls
Lesson: Removing Bugs
- Open Web Application Security Project (OWASP)
- OWASP Top Ten Overview
- Web Application Security Consortium (WASC)
- Common Weaknesses Enumeration (CWE)
- CERT Secure Coding Standard
- Microsoft Security Response Center
- Software-Specific Threat Intelligence
Session: Foundation for Securing Web Applications
Lesson: Principles of Information Security
- Security Is a Lifecycle Issue
- Minimize Attack Surface Area
- Layers of Defense: Tenacious D
- Compartmentalize
- Consider All Application States
- Do NOT Trust the Untrusted
- AppSec Dissection of the Verkada Exploit
- Tutorial: Working with Eclipse (JEE Version) and Apache TomEE 7x
- Tutorial: Working with the HSQL Database
- Lab: Case Study Setup and Review
Session: STIG Stomping 101
Lesson: Unvalidated Data
- Applicable STIGs
- Buffer Overflows
- Integer Arithmetic Vulnerabilities
- Defining and Defending Trust Boundaries
- Rigorous., Positive Specifications
- Whitelisting vs Blacklisting
- Challenges: Free-Form Text, Email Addresses, and Uploaded Files
- Lab: Defending Trust Boundaries
- Lab: Toolbox
- Lab: STIG Walk-Throughs
Lesson: Access Control
- Applicable STIGs
- Elevation of Privileges
- Insufficient Flow Control
- Unprotected URL/Resource Access/Forceful Browsing
- Lab: Unsafe Direct Object References
- Session Management
- HttpOnly and Security Headers
- Cross Site Request Forgeries (CSRF)
- CSRF Defenses
- Lab: Cross-Site Request Forgeries
- Spotlight: Verizon
- Lab: STIG Walk-Throughs
Lesson: Cryptographic Failures
- Applicable STIGs
- Identifying Protection Needs
- Evolving Privacy Considerations
- Options for Protecting Data
- Transport/Message Level Security
- Weak Cryptographic Processing
- Keys and Key Management
- NIST Recommendations
- Threats of Quantum Computing
- Steal Now, Crack Later Threat
- Lab: Defending Sensitive Data
- Lab: STIG Walk-Throughs
Lesson: Injection
- Applicable STIGs
- Injection Flaws
- SQL Injection Attacks Evolve
- Drill Down on Stored Procedures
- Other Forms of Server-Side Injection
- Minimizing Injection Flaws
- Lab: Defending Against SQL Injection
- Client-side Injection: XSS
- Persistent, Reflective, and DOM-Based XSS
- Best Practices for Untrusted Data
- Lab: Defending Against XSS
- Lab: STIG Walk-Throughs
Lesson: Security Misconfiguration
- Applicable STIGs
- System Hardening
- Risks with Internet-Connected Resources (Servers to Cloud)
- Minimalist Configurations
- Application Whitelisting
- Secure Baseline
- Segmentation with Containers and Cloud
- Resolution of External References
- Safe XML Processing
- Lab: Safe XML Processing
- Lab: STIG Walk-Throughs
Session: STIG Stomping 102
Lesson: Vulnerable and Outdated Components
- Applicable STIGs
- Vulnerable Components
- Software Inventory
- Managing Updates: Balancing Risk and Timeliness
- AppSec Dissection of Ongoing Microsoft Exchange Exploits
- Spotlight: Equifax
- Lab: STIG Walk-Throughs
Lesson: Identification and Authentication Failures
- Applicable STIGs
- Quality and Protection of Authentication Data
- Proper hashing of passwords
- Handling Passwords on Server Side
- Lab: Argon2 Hashing
- Lab: Identifying and Defending Authentication Assets
- Lab: Spotlight: SQL Server Administrators
- Lab: STIG Walk-Throughs
Lesson: Software and Data Integrity Failures
- Applicable STIGs
- Serialization/Deserialization
- Issues with Consuming Vulnerable Software
- Using Trusted Repositories
- CI/CD Pipeline Issues
- Protecting Software Development Resources
- Lab: STIG Walk-Throughs
Lesson: Security Logging and Monitoring Failures
- Applicable STIGs
- Detecting Threats and Active Attacks
- Best Practices for Determining What to Log
- Safe Logging in Support of Forensics
- Lab: STIG Walk-Throughs
Lesson: Server-Side Request Forgery (SSRF)
- Applicable STIGs
- Understanding SSRF
- Remote Resource Access Scenarios
- Complexity of Cloud Services
- SSRF Defense in Depth
- Positive Allow Lists
- Lab: STIG Walk-Throughs
Session: Additional Concerns, Services, and Rich Interfaces
Lesson: Database Security
- Applicable STIGs
- Design and Configuration
- Identification and Authentication
- Computing Environment
- Database Auditing
- Boundary Defenses
- Continuity of Service
- Vulnerability and Incident Management
- Lab: STIG Walk-Throughs
Lesson: Defending Web Services
- Applicable STIGs
- Web Service Security Exposures
- When Transport-Level Alone is NOT Enough
- Message-Level Security
- WS-Security Roadmap
- Web Service Attacks
- Web Service Appliance/Gateways
- Lab: Web Service Attacks
- Lab: STIG Walk-Throughs
Lesson: Defending Rich Interfaces and REST
- Applicable STIGs
- How Attackers See Rich Interfaces
- Attack Surface Changes When Moving to Rich Interfaces and REST
- Bridging and its Potential Problems
- Three Basic Tenets for Safe Rich Interfaces
- OWASP REST Security Recommendations
- Lab: STIG Walk-Throughs
Session: Moving Forward with Application Security
Lesson: Application Security and Development Checklists
- Checklist Overview, Conventions, and Best Practices
- Leveraging Common AppSec Practices and Control
- Actionable Application Security
- Additional Tools for the Toolbox
- Demo: Actionable AppSec
- Strength Training: Project Teams/Developers
- Strength Training: IT Organizations
- Lab: Recent Incidents
- Spotlight: Capital One
Lesson: SDL Process Overview
- Revisiting Attack/Defense Basics
- Types of Security Controls
- Attack Phases: Offensive Actions and Defensive Controls
- Secure Software Development Processes
- Shifting Left
- Lab: Risk Escalators
Optional Content
Emerging Game Changers in Web Application Security
- Quantum Computing: Timeframe
- Threats to Current Cryptography
- Post-Quantum vs. Quantum Cryptography
- Today’s Defenses Against Tomorrow’s Quantum Computing
- AI in Web Application Security
- AI-Powered Threat Detection
- AI for Secure Coding
- AI in Incident Response
- Challenges and Ethical Considerations in AI for Security