Useful Links
1. Introduction to Web Security and Privacy
2. Core Web Technologies and Security Models
3. Client-Side Vulnerabilities
4. Server-Side Vulnerabilities
5. Cryptography in Web Security
6. Authentication and Authorization
7. Web Privacy
8. Secure Development Lifecycle
9. Advanced Web Security Topics
  1. Computer Science
  2. Cybersecurity

Web Security and Privacy

1. Introduction to Web Security and Privacy
2. Core Web Technologies and Security Models
3. Client-Side Vulnerabilities
4. Server-Side Vulnerabilities
5. Cryptography in Web Security
6. Authentication and Authorization
7. Web Privacy
8. Secure Development Lifecycle
9. Advanced Web Security Topics
  1. Cryptography in Web Security
    1. Fundamentals of Cryptography
      1. Symmetric Encryption
        1. Block Ciphers
          1. Stream Ciphers
            1. Key Management
            2. Asymmetric Encryption
              1. Key Pairs
                1. Use Cases for Encryption
                  1. Use Cases for Key Exchange
                  2. Hashing Functions
                    1. Properties of Secure Hashes
                      1. SHA-2
                        1. SHA-3
                        2. Digital Signatures
                          1. Signature Generation
                            1. Signature Verification
                          2. Public Key Infrastructure
                            1. Digital Certificates
                              1. X.509 Certificate Structure
                                1. Certificate Validation
                                2. Certificate Authorities
                                  1. Trust Models
                                    1. Certificate Issuance Process
                                    2. Certificate Revocation
                                      1. Certificate Revocation Lists
                                        1. Online Certificate Status Protocol
                                      2. Transport Layer Security
                                        1. TLS Handshake Protocol
                                          1. Negotiation Steps
                                            1. Key Exchange Methods
                                            2. Cipher Suites
                                              1. Components of Cipher Suites
                                                1. Secure Cipher Suite Selection
                                                2. Perfect Forward Secrecy
                                                  1. Ephemeral Keys
                                                    1. Benefits of PFS
                                                  2. Password Storage
                                                    1. Hashing vs. Encryption
                                                      1. Use Cases and Differences
                                                      2. Salting Passwords
                                                        1. Purpose of Salting
                                                          1. Implementation Best Practices
                                                          2. Key Stretching
                                                            1. bcrypt
                                                              1. scrypt
                                                                1. Argon2

                                                            Previous

                                                            4. Server-Side Vulnerabilities

                                                            Go to top

                                                            Next

                                                            6. Authentication and Authorization

                                                            © 2025 Useful Links. All rights reserved.

                                                            About•Bluesky•X.com