Application Security
Presentations and examples
- Program of the course
- Information Security
- Cryptography
- OWASP Top 10
- PKI and digital certificates
- Identity and Access Management
- OAuth2
- Identity Federation
- Database Security
- Infrastructure Security
- Security Architecture
- Threat Modeling
- Verification
Exercises
- Exercises set 1, Information Security, Cryptography
Due date: 1.3.2017
- Exercises set 2, OWASP Top 10, part 1
Due date: 15.3.2017
- Exercises set 3, OWASP Top 10, part 2
Tigers,
Grizzlies,
Kangaroos,
Wizards,
Due date: 22.3.2017
- Exercises set 4, PKI and certificates
Tigers,
Grizzlies,
Kangaroos,
Wizards,
Due date: 29.3.2017
- Exercises set 5, Digital certificates, LDAP
Tigers,
Grizzlies,
Kangaroos,
Wizards,
Due date: 5.4.2017
- Exercises set 6, Authentication
Tigers,
Grizzlies,
Kangaroos,
Wizards,
Due date: 26.4.2017
- Exercises set 7, OAuth2
Tigers,
Grizzlies,
Kangaroos,
Wizards,
Due date: 10.5.2017
- Exercises set 8, Identity Federation
Tigers,
Grizzlies,
Kangaroos,
Wizards,
Due date: 17.5.2017
- Exercises set 9, Database Security
Tigers,
Grizzlies,
Kangaroos,
Wizards,
Due date: 31.5.2017
Roadmap
- 22.2.2017: Information Security, Cryptography
- 1.3.2017: OWASP Top 10, part 1
- 15.3.2017: OWASP Top 10, part 2
- 22.3.2017: PKI and certificates
- 29.3.2017: Identity & access management, part 1
- 5.4.2017: Identity & access management, part 2
- 12.4.2017: OAuth2, part 1
- 26.4.2017: OAuth2, part 2
- 10.5.2017: Identity Federation
- 17.5.2017: Database Security
- 31.5.2017: Infrastructure Security, Security Architecture part 1
- 7.6.2017: Security Architecture, part 2
- 14.6.2017: Threat Modeling
- 21.6.2017: Verification
Groups
- Tigers: Pawel, Mateusz (Python)
- Grizzlies: Piotr, Norbert (Python)
- Kangaroos: Damian, Michał (C#)
- Wizards: Valentyna, Igor, Ivan (Python)
Komplet materiałów z poprzedniej edycji