Useful Links
Computer Science
Cybersecurity
Web Security and Privacy
1. Introduction to Web Security and Privacy
2. Core Web Technologies and Security Models
3. Client-Side Vulnerabilities
4. Server-Side Vulnerabilities
5. Cryptography in Web Security
6. Authentication and Authorization
7. Web Privacy
8. Secure Development Lifecycle
9. Advanced Web Security Topics
Cryptography in Web Security
Fundamentals of Cryptography
Symmetric Encryption
Block Ciphers
Stream Ciphers
Key Management
Asymmetric Encryption
Key Pairs
Use Cases for Encryption
Use Cases for Key Exchange
Hashing Functions
Properties of Secure Hashes
SHA-2
SHA-3
Digital Signatures
Signature Generation
Signature Verification
Public Key Infrastructure
Digital Certificates
X.509 Certificate Structure
Certificate Validation
Certificate Authorities
Trust Models
Certificate Issuance Process
Certificate Revocation
Certificate Revocation Lists
Online Certificate Status Protocol
Transport Layer Security
TLS Handshake Protocol
Negotiation Steps
Key Exchange Methods
Cipher Suites
Components of Cipher Suites
Secure Cipher Suite Selection
Perfect Forward Secrecy
Ephemeral Keys
Benefits of PFS
Password Storage
Hashing vs. Encryption
Use Cases and Differences
Salting Passwords
Purpose of Salting
Implementation Best Practices
Key Stretching
bcrypt
scrypt
Argon2
Previous
4. Server-Side Vulnerabilities
Go to top
Next
6. Authentication and Authorization