Input Validation Mechanisms |
- Blacklisting
- Whitelisting
|
Cross-Site Scripting |
No description is available. |
SQL Injection |
No description available |
XML External Entity attack |
No description available |
Cross-Site Request Forgery |
No description is available. |
Encoding, Encryption and Hashing |
No description available. |
Authentication related Vulnerabilities |
- Brute force Attacks
- Password Storage and Password Policy
|
Understanding of OWASP Top 10 Vulnerabilities |
No description available. |
Security Best Practices and Hardening Mechanisms. |
- Same Origin Policy
- Security Headers.
|
Security Best Practices and Hardening Mechanisms. |
- Same Origin Policy
- Security Headers.
|
TLS security |
- TLS Certificate Misconfiguration
- Symmetric and Asymmetric Ciphers
|
Server-Side Request Forgery |
No description available. |
Authorization and Session Management related flaws |
- Insecure Direct Object Reference (IDOR)
- Privilege Escalation
- Parameter Manipulation attacks
- Securing Cookies
|
Insecure File Uploads |
No description available. |
Code Injection Vulnerabilities |
No description available. |
Business Logic Flaws |
No description available. |
Directory Traversal Vulnerabilities |
No description available. |
Security Misconfigurations. |
No description available. |
Information Disclosure. |
No description available. |
Vulnerable and Outdated Components. |
No description available. |
Common Supply Chain Attacks and Prevention Methods. |
No description available. |
Official Information |
https://secops.group/product/certified-application-security-practitioner/ |