Interested in a private company training? Request it here.
Not ready to book yet? Request an offer here.
This chapter introduces the fundamental concepts and terminology of web security. It explains why web security is important, how web applications are commonly attacked, and which core principles are used to protect them. The goal is to establish a shared vocabulary and security mindset that will be used throughout the rest of the course.
How do you keep prying eyes away from your data? Encrypting data ensures that only the intended receiver of the data can understand it. So how does this work? We will look at symmetric keys versus asymmetric ones. We will also look at the most used encryption algorithms, what they offer, and how to use them correctly.
Before diving into architectures, we lock in the OWASP Top 10 as a navigation tool. Each later chapter will explicitly map problems and mitigations back to OWASP categories.
HTTPS encrypts communication between clients and servers, but how does it work, and how do you enable it for your application? In this chapter, we will look at the TLS handshake, how to get a certificate, and learn how to enforce HTTPS with HSTS.
This section introduces how cookies work and why they are critical to modern web authentication and session management. It explores common risks associated with improperly configured cookies and explains best practices for protecting them against attacks such as session hijacking.
This module explains how authentication and authorization are implemented in traditional server-rendered web applications. We focus on browser-based security patterns, showing how users are authenticated, how identity information is stored and propagated, and how access to application functionality is enforced on the server. Emphasis is placed on secure defaults, real-world deployment scenarios, and avoiding common access control pitfalls.
Server-rendered forms introduce classic web risks: CSRF, mass assignment / overposting, and validation issues. You'll learn how these attacks work and how to prevent them.
When your application talks to a database, injection becomes a primary risk. We cover how injection happens in .NET, how to avoid it using parameterization, and what ORMs do and don't protect you from.
OAuth2 is the standard for delegated authorization. We focus on protecting ASP.NET Core APIs using Entra ID, validating tokens, and implementing authorization using scopes/claims.
Once JavaScript is involved, the browser becomes an active security boundary. CORS exists to control cross-origin access, but misconfiguration is extremely common and can expose APIs unintentionally.
Script injection is one of the most damaging browser-based attacks. This module explains reflected/stored/DOM XSS, and focuses on practical mitigations: encoding, safer templates, and CSP.
Single-Page Applications have a different security profile than traditional server-rendered applications. Since SPAs run entirely in the browser, they cannot safely store secrets and rely on API calls for all backend interaction. This makes secure authentication and token handling essential. Modern SPA security therefore uses OAuth 2.0 with PKCE for public clients to prevent token interception, and often applies the Backend-for-Frontend (BFF) pattern to move token handling and sensitive logic to a trusted server, building on the security concepts already seen in server-rendered and API architectures.
Bots and AI systems can be extremely helpful by automating repetitive tasks, improving customer support, and assisting with analysis and decision-making. They increase efficiency, reduce human error, and make technology more accessible. At the same time, these technologies can be dangerous when misused. Automated bots can be abused for spam, fraud, or large-scale attacks, while advanced AI can convincingly mimic human behavior, making abuse harder to detect. Without proper safeguards, AI systems may also expose sensitive data or behave in unintended ways. Understanding both the benefits and the risks of bots and AI is essential to using them responsibly and securely.
Web security is more than fixing vulnerabilities in code. Real protection comes from combining secure infrastructure, proven security frameworks, and continuous processes that reduce risk over time. This chapter zooms out to show how all the moving parts fit together: from network and cloud foundations to policies, monitoring, and incident response.
Cybersecurity is becoming an increasingly important topic for organizations. The quantity and importance of data entrusted to web applications is growing, and defenders need to learn how to secure them. Imagine your organization making the news, not because of some new world-changing product, but because of a data leak containing all your customers' data, including personal information and credit card details! As a modern web developer, mastering cybersecurity skills is important because you cannot afford not to!
This course takes you through the different cybersecurity threats and defences and teaches you hands-on how to apply them to ASP.NET Core. Among others, you will learn how to authenticate with OpenID Connect and Entra ID, protect your API with OAuth2 and secure your company data with proper encryption techniques. Starting with simple server-rendered websites and progressing to APIs, modern JavaScript, and full-featured web applications, including AI-powered chatbot integration, this course provides in-depth, hands-on experience in securing web-based applications from the developer's perspective.
This course is meant for developers that have experience with ASP.NET Core and want to make the world a safer place through applied cybersecurity best practices.