Useful Links
Computer Science
Cybersecurity
Web Application Security
1. Introduction to Web Application Security
2. Core Web Technologies and Protocols
3. Common Vulnerabilities and Attacks
4. Authentication and Session Management
5. Secure Development Lifecycle
6. Web Application Defense and Hardening
7. API Security
8. Security Testing and Assessment
9. Advanced Security Topics
Web Application Defense and Hardening
Defensive Technologies
Web Application Firewall
WAF Deployment Models
Network-Based WAF
Host-Based WAF
Cloud-Based WAF
WAF Rule Sets
OWASP Core Rule Set
Custom Rules
Rule Tuning
WAF Bypass Techniques
WAF Management
Intrusion Detection and Prevention Systems
Network-Based IDS/IPS
Host-Based IDS/IPS
Application-Layer IDS/IPS
Signature-Based Detection
Anomaly-Based Detection
Runtime Application Self-Protection
RASP Capabilities
Integration Methods
Performance Considerations
Bot Management
Bot Detection Techniques
Rate Limiting
CAPTCHA Systems
HTTP Security Headers
HTTP Strict Transport Security
HSTS Policy Configuration
Preload Lists
Subdomain Inclusion
Content Security Policy
CSP Directives
script-src
style-src
img-src
connect-src
font-src
object-src
media-src
frame-src
CSP Reporting
CSP Nonce and Hash
X-Content-Type-Options
MIME Sniffing Prevention
X-Frame-Options
Clickjacking Protection
Frame Ancestors Control
Referrer-Policy
Referrer Information Control
Privacy Considerations
Permissions-Policy
Feature Policy Control
Browser API Restrictions
Server and Environment Hardening
Service Hardening
Disabling Unnecessary Services
Service Configuration
Port Management
File System Security
File Permissions
Directory Permissions
Secure File Storage
File Upload Security
Patch Management
Vulnerability Assessment
Patch Testing
Deployment Strategies
Rollback Procedures
Network Security
Firewall Configuration
Network Segmentation
VPN Security
Rate Limiting and Throttling
Rate Limiting Strategies
Fixed Window
Sliding Window
Token Bucket
Leaky Bucket
Implementation Approaches
Application-Level Rate Limiting
Infrastructure-Level Rate Limiting
Distributed Rate Limiting
Rate Limiting Bypass Prevention
Anti-Automation Defenses
CAPTCHA Systems
Text-Based CAPTCHA
Image-Based CAPTCHA
Audio CAPTCHA
reCAPTCHA
Behavioral Analysis
Mouse Movement Tracking
Keystroke Dynamics
Browser Fingerprinting
Device Fingerprinting
Hardware Fingerprinting
Software Fingerprinting
Network Fingerprinting
Previous
5. Secure Development Lifecycle
Go to top
Next
7. API Security