Application Security Controls for E-commerce Web and Mobile Applications
Master essential application security controls to protect e-commerce web and mobile applications from modern threats and vulnerabilities.
...
Share
Secure Authentication, Authorization, and Session Management
Unit 1: Authentication Fundamentals
AuthN: The Front Door
Password Best Practices
MFA: Adding a Lock
Social Login Security
Biometric Authentication
Unit 2: Authorization and Access Control
AuthZ: Who Gets In?
RBAC: Roles and Permissions
Least Privilege Principle
Access Control Lists (ACLs)
Attribute-Based Access
Unit 3: Session Management
Session Management 101
Secure Session IDs
Session Timeouts
Session Hijacking Defense
Proper Logout Handling
Preventing Injection Attacks and Data Protection
Unit 1: Input Validation and Output Encoding
Intro to Input Validation
Server-Side Validation
Client-Side Validation
Output Encoding
Encoding in Practice
Unit 2: Preventing Common Web Application Vulnerabilities
SQL Injection
XSS Attacks
CSRF Attacks
Command Injection
File Upload Security
Unit 3: Securing Communication Channels
HTTPS and TLS Intro
Obtaining Certificates
Configuring HTTPS
TLS Best Practices
Testing Your Setup
Securing Payment Processing and Mobile Applications
Unit 1: Secure Payment Processing Fundamentals
PCI DSS Overview
Payment Gateway Integration
Tokenization Basics
Scoping Your Environment
SAQ Overview
Unit 2: Mobile Application Security
Mobile Threat Landscape
Secure Data Storage
API Security Best Practices
Code Obfuscation
Mobile App Hardening
Unit 3: Advanced Payment Security Techniques
Advanced Tokenization
Point-to-Point Encryption
3-D Secure Authentication
Fraud Detection Systems
Address Verification System
Monitoring, Detection, and Incident Response
Unit 1: Web Application Firewalls (WAFs)
WAFs: An Intro
WAF Deployment Models
Configuring WAF Rules
WAF Management
Bypassing WAFs
Unit 2: IDS/IPS for E-commerce
IDS/IPS: An Intro
IDS/IPS Deployment
IDS/IPS Signatures
IDS/IPS Management
Evasion Techniques
Unit 3: Security Assessments
Security Assessments
Vulnerability Scanning
Penetration Testing
Reporting
Remediation
Unit 4: Logging and Monitoring
Logging: An Intro
Log Management
Anomaly Detection
Incident Response
Incident Handling