DT144G Web Application Security
You will find the study guide here
[PDF]
[TeX].
This guide covers the entire course, all reading instructions are found there.
You find the lecture slides below.
The reading instructions to cover each lecture are found in the study guide above.
- Introduction to Security
[PDF]
[TeX]
- Foundations of Security
[PDF]
[TeX]
- Identification and Authentication
[PDF]
[[TeX]]
- Information Theory
[PDF]
[TeX]
- Cryptographic Mechanisms, Part I
[PDF]
[TeX]
- Cryptographic Mechanisms, Part II
[PDF]
[TeX]
- Secure Protocols
[PDF]
[TeX]
- Security Usability
[PDF]
[TeX]
- Access Control
[PDF]
[TeX]
- Reference Monitors
[PDF]
[TeX]
- Accountability and Non-Repudiation
[PDF]
[TeX]
- Software Security
[PDF]
[TeX]
- Database Security
[PDF]
The slides of the workshops in the course can be found below.
What they cover in detail can be found in the study guide above.
- Sensitive Data Exposure
[PDF]
- Broken Authentication and Session Management
[PDF]
- Missing Function-Level Access Control
[PDF]
- Injection Attacks and Cross-Site Scripting
[PDF]
- Cross-Site Request Forgery
[PDF]
- Unvalidated Redirects and Forwards
[PDF]
- Security Misconfiguration and Using Components with Known Vulnerabilities
[PDF]
[statistics]
The following labs are recommended for practice, but are not mandatory during the course.
- L1 Privacy of Communication
[PDF]
[TeX]
- L2 Network Intrusion Detection
[PDF]
[TeX]
- L3 Host-Based Intrusion Detection
[PDF]
[TeX]
- L4 Password Cracking and Social Engineering
[PDF]
[TeX]
- L5 Denial of Service Attacks (in Swedish)
[PDF]
[TeX]
The course is examined through a project.
The instruction can be found here
[PDF]
[TeX].
However, to hand it in and to get credits for this you need to be a registered student on the course.
$Id: index.html 2063 2014-10-29 18:15:25Z danbos $