Useful Links
Computer Science
Cybersecurity
Web Security and Privacy
1. Introduction to Web Security and Privacy
2. Core Web Technologies and Security Models
3. Client-Side Vulnerabilities
4. Server-Side Vulnerabilities
5. Cryptography in Web Security
6. Authentication and Authorization
7. Web Privacy
8. Secure Development Lifecycle
9. Advanced Web Security Topics
Core Web Technologies and Security Models
HTTP Protocol
HTTP Requests and Responses
Request Structure
Response Structure
HTTP Methods
GET
POST
PUT
DELETE
PATCH
HEAD
OPTIONS
HTTP Headers
Request Headers
Response Headers
Security-Related Headers
Stateless Nature of HTTP
Implications for Authentication
Session Management
HTTPS and Secure Web
Role of SSL/TLS
Encryption of Data in Transit
Authentication of Server
TLS Handshake Process
Key Exchange
Certificate Verification
Session Establishment
Certificate Authorities
Root CAs
Intermediate CAs
Certificate Chains
Trust Stores
Web Architecture Components
Client Browser
Browser Rendering Engine
Browser Extensions and Security
Web Server
Web Server Security
Application Server Security
Database
Database Security Controls
Secure Database Connections
Proxies and CDNs
Forward Proxies
Reverse Proxies
CDN Security Features
Caching Implications for Security
Browser Security Model
Same-Origin Policy
Definition and Purpose
Origin Determination
Scheme
Host
Port
Cross-Origin Resource Sharing
CORS Headers
Preflight Requests
CORS Misconfigurations
Content Security Policy
CSP Directives
CSP Bypass Techniques
Implementing CSP
Sandboxing
iframe Sandbox Attribute
Limitations and Use Cases
Previous
1. Introduction to Web Security and Privacy
Go to top
Next
3. Client-Side Vulnerabilities