Useful Links
Computer Science
Cybersecurity
Web Application Security
1. Introduction to Web Application Security
2. Core Web Technologies and Protocols
3. Common Vulnerabilities and Attacks
4. Authentication and Session Management
5. Secure Development Lifecycle
6. Web Application Defense and Hardening
7. API Security
8. Security Testing and Assessment
9. Advanced Security Topics
Authentication and Session Management
Authentication Mechanisms
Password-Based Authentication
Secure Password Storage
Cryptographic Hashing
Salting Techniques
Peppering Methods
Key Stretching
Password Policy Implementation
Complexity Requirements
Length Requirements
Character Set Requirements
Multi-Factor Authentication
Knowledge Factors
Passwords
Security Questions
PINs
Possession Factors
Hardware Tokens
Mobile Devices
Smart Cards
Inherence Factors
Biometric Authentication
Behavioral Biometrics
MFA Implementation Challenges
User Experience
Recovery Mechanisms
Backup Authentication
Token-Based Authentication
JSON Web Tokens
JWT Structure
Claims and Payload
Signature Verification
Token Expiration
Token Revocation
OAuth 2.0
Authorization Code Grant
Implicit Grant
Resource Owner Password Credentials Grant
Client Credentials Grant
Scopes and Permissions
Access Tokens
Refresh Tokens
OpenID Connect
Identity Layer
ID Tokens
UserInfo Endpoint
Certificate-Based Authentication
Client Certificates
Certificate Validation
PKI Infrastructure
Session Management
Session Tokens and Cookies
Token Generation
Cryptographically Secure Random Generation
Token Entropy
Token Storage
Server-Side Storage
Client-Side Storage
Token Expiration
Absolute Timeout
Idle Timeout
Sliding Expiration
Secure Cookie Configuration
HttpOnly Attribute
Secure Attribute
SameSite Attribute
Strict Mode
Lax Mode
None Mode
Domain and Path Attributes
Session Security Attacks
Session Fixation
Attack Vectors
Prevention Techniques
Session Hijacking
Network Sniffing
Cross-Site Scripting
Malware-Based Attacks
Cross-Site Request Forgery
CSRF Attack Mechanisms
CSRF Token Implementation
Synchronizer Token Pattern
Double Submit Cookie Pattern
SameSite Cookie Defense
Previous
3. Common Vulnerabilities and Attacks
Go to top
Next
5. Secure Development Lifecycle