Log In
0% completed
All Lessons
Free Lessons (7)
Introduction
Introduction to the Course
Who This Course Is For?
Formatting
Errata and Additional Content
Understanding The Browser
Browser Basics
What Does a Browser Do?
Vendors
A Browser for Developers
Quiz Yourself on Browsers
HTTP
Introduction to HTTP
How HTTP Works
Mechanics: HTTP vs HTTPS vs H2
Mechanics: Encryption
HTTPS Everywhere
GET vs POST
Quiz Yourself on HTTP
Protection through HTTP Headers
HTTP Strict Transport Security
HTTP Public Key Pinning
Expect-CT
X-Frame-Options
Content-Security-Policy
X-XSS-Protection
Feature-Policy
X-Content-Type-Options
Cross Origin Resource Sharing
X-Permitted-Cross-Domain-Policies & Referrer-Policy
The reporting API
Quiz Yourself on HTTP Headers
HTTP Cookies
Introduction HTTP Cookies
What's Behind a Cookie?
Session and Persistent Cookies
Host-only
Supercookies
Encrypt it Or Forget it
JavaScript Can't Touch This
SameSite: The CSRF Killer
Alternatives
Conclusion: What Would LeBron Do?
Quiz Yourself on HTTP Cookies
Situationals
Introduction to Situationals
Denylisting vs. Allowlisting
Logging Secrets
Never Trust The Client
Generating Session IDs
Querying Your Database While Avoiding SQL Injections
Dependencies With Known Vulnerabilities
Have I Been Pwned?
Session Invalidation in a Stateless Architecture
My CDN Was Compromised!
The Slow Death of EV Certificates
Paranoid Mode: On
Low-priority and Delegated Domains
OWASP
Hold The Door
Quiz Yourself on Situationals
DDoS Attacks
Introduction to DDoS
Anatomy of a DDoS
Why Would Anyone Bomb Me?
Notable DDoS Attacks
Don't Panic: Some Services to The Rescue!
Hackers Welcome
Quiz Yourself on DDoS Attacks
Bug Bounty Programs
Introduction to Bug Bounty Programs
What's in a Program?
Security.txt
HackerOne
Dealing With Researchers
Malicious Reporters
Quiz Yourself on Bug Bounty Programs
Conclusion
This Is The End
In the Works
A Few Thank Yous
Web Application Security for the Everyday Software Engineer
/
...
/
Introduction to DDoS
Introduction to DDoS
Let's introduce this chapter!
We'll cover the following...
Popular web applications are prone to attack
Chapter walkthrough
Popular web applications
...