Certified Application Security Engineer
Course Outline
Certified Application Security Engineer (CASE)
Course Outline
Module 01: Understanding Application Security, Threats, and Attacks
What is a Secure Application
Need for Application Security
Most Common Application Level Attacks
SQL Injection Attacks
Cross-site Scripting (XSS) Attacks
Parameter Tampering
Directory Traversal
Cross-site Request Forgery (CSRF) Attack
Denial-of-Service (DoS) Attack
o Denial-of-Service (DoS): Examples
Session Attacks
o Cookie Poisoning Attacks
o Session Fixation
Why Applications become Vulnerable to Attacks
Common Reasons for Existence of Application Vulnerabilities
Common Flaws Existed due to Insecure Coding Techniques
Improper Input Validation
Insufficient Transport Layer Protection
Improper Error Handling
Insecure Cryptographic Storage
Broken Authentication and Session Management
Unvalidated Redirects and Forwards
Page | 1 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
Insecure Direct Object References
Failure to Restrict URL Access
What Constitutes a Comprehensive Application Security?
Application Security Frame
3W’s in Application Security
Insecure Application: A Software Development Problem
Solution: Integrating Security in Software Development Life Cycle (SDLC)
Functional vs Security Activities in SDLC
Advantages of Integrating Security in SDLC
Software Security Standards, Models, and Frameworks
The Open Web Application Security Project (OWASP)
OWASP TOP 10 Attacks-2017
The Web Application Security Consortium (WASC)
WASC Threat Classification
Software Security Framework
o Software Assurance Maturity Model (SAMM)
o Building Security in Maturity Model (BSIMM)
BSIMM vs OpenSAMM
Module 02: Security Requirements Gathering
Importance of Gathering Security Requirements
Security Requirements
Gathering Security Requirements
Why We Need Different Approach for Security Requirements Gathering
Key Benefits of Addressing Security at Requirement Phase
Stakeholders Involvement in Security Requirements Gathering
Characteristics of Good Security Requirement: SMART
Types of Security Requirements
o Functional Security Requirements
o Security Drivers
Security Requirement Engineering (SRE)
Page | 2 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
SRE Phases
o Security Requirement Elicitation
o Security Requirement Analysis
o Security Requirement Specification
o Security Requirement Management
Common Mistakes Made in Each Phase of SRE
Different Security Requirement Engineering Approaches/Model
Abuse Case and Security Use Case Modeling
Abuse Cases
Threatens Relationship
Abuse Case Modeling Steps
Abuse Cases: Advantages and Disadvantages
Abuse Case Template
Security Use Cases
Security Use Cases are Abuse Case Driven
Modeling Steps for Security Use Cases
Mitigates Relationship
Abuse Case vs Security Use Case
Security Use Case: Advantages and Disadvantages
Security Use Case Template
Security Use Case Guidelines
Example 1: Use Case for Online Bidding System
Example 1: Abuse Case for Online Bidding System
Example 1: Security Use Case for Online Bidding System
Example 2: Use Case for ATM System
Example 2: Abuse Case for ATM System
Example 2: Security Use Case for ATM System
Example 3: Use Case for E-commerce System
Example 3: Abuse Case for E-commerce System
Example 3: Security Use Case for E-commerce System
Page | 3 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
Effectiveness of Abuse and Security Case
Abuser and Security Stories
Textual Description Template: Abuser Stories and Security Stories
Examples: Abuser Stories and Security Stories
Effectiveness of Abuser and Security Stories
Abuser Stories: Advantages and Disadvantages
Security Quality Requirements Engineering (SQUARE)
SQUARE Effectiveness
SQUARE Process
SQUARE: Advantages and Disadvantages
Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
OCTAVE Effectiveness
OCTAVE Steps
OCTAVE: Advantages and Disadvantages
Module 03: Secure Application Design and Architecture
Relative Cost of Fixing Vulnerabilities at Different Phases of SDLC
Secure Application Design and Architecture
Goal of Secure Design Process
Secure Design Actions
Security Requirement Specifications
Secure Design Principles
Threat Modeling
Secure Application Architecture
Secure Design Principles
Define Secure Design principles
Secure Design Principles
o Security through obscurity
o Secure the Weakest Link
o Use Least Privilege Principle
o Secure by Default
Page | 4 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
o Fail Securely
o Apply Defense in Depth
o Do Not Trust User Input
o Reduce Attack Surface
o Enable Auditing and Logging
o Keep Security Simple
o Separation of Duties
o Fix Security Issues Correctly
o Apply Security in Design Phase
o Protect Sensitive Data
o Exception Handling
o Secure Memory Management
o Protect Memory or Storage Secrets
o Fundamentals of Control Granularity
o Fault Tolerance
o Fault Detection
o Fault Removal
o Fault Avoidance
o Loose Coupling
o High Cohesion
o Change Management and Version Control
Threat Modeling
Threat Modeling Phases
o Attack Surface Evaluation
o Threat Identification
o Impact Analysis
o Control Recommendations
Threat Modeling Process
o Identify Security Objective
o Application Overview
o Decompose Application
Page | 5 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
o Identify Threats
o Identify Vulnerabilities
Identify Security Objective
o How to Identify Security Objectives
Create an Application Overview
Draw the End-to-End Deployment Architecture
Identify Various User Roles
Identify Use Cases Scenarios
Identify Technologies
Identify Application Security Mechanisms
Decompose Application
Prepare and Document Threat Model Information
o Example: Threat Model Information
Identify the External Dependencies
o External Dependencies: Example
Identify the Entry Points
o Entry Points: Example
Identify the Assets
o Assets: Example
Identify the Trust Levels
o Trust Levels: Example
Define Trust Levels to Entry points
Define Trust Levels to Assets
Perform Application Modelling using Data Flow Diagrams (DFDs)
Determine the Threats: Identify the Goal of an Attacker and Create Threat Profile
o Example: Attacker’s Goal/Threat Profile and Vulnerabilities Associated
Determine the Threats: Create a Security Profile
Identify the Threats
o The STRIDE Model
Example: Threat Categorized and Identified using STRIDE
Determine Countermeasures and Mitigation Security Controls
Page | 6 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
Document the Threats
Rating the Threats
o Rating the Threats: DREAD Model
Secure Application Architecture
Design Secure Application Architecture
Module 04: Secure Coding Practices for Input Validation
Input Validation Pattern
Validation and Security Issues
Impact of Invalid Data Input
Data Validation Techniques
Input Validation using Frameworks and APIs
Open Source Validation Framework for Java
Servlet Filters
Validation Filters for Servlet
Data Validation using OWASP ESAPI
Data Validation: Struts Framework
Struts Validator
Struts Validation and Security
Data Validation using Struts Validator
Avoid Duplication of Validation Forms
Secure and Insecure Struts Validation Code
Struts Validator Class
Secure and Insecure Code for Struts Validator Class
Enable the Struts Validator
Secure and Insecure Struts Validator Code
Struts 2 Framework Validator
Struts 2 Framework: Built-in Data Validators
Struts 2 Framework Annotation Based Validators
Struts 2 Custom Validation: Workflow Interceptor
Struts 2 Ajax Validation: jsonValidation Interceptor
Page | 7 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
Data Validation: Spring Framework
Spring Validator
Data Validation: Spring MVC Framework
Implementing Validator
JSR 380 Bean Validator API
Configuring JSR 380
Custom Validator Implementation in Spring
Spring Validation and Security
Input Validation Errors
Improper Sanitization of Untrusted Data
Improper Validation of Strings
Improper Logging of User Inputs
Improper Incorporation of Malicious Inputs into Format Strings
Inappropriate Use of Split Characters in Data Structures
Improper Validation of Non-Character Code Points
Improper Use of String Modification
Improper Comparison of Locale-dependent Data
Best Practices for Input Validation
Common Secure Coding Practices
SQL Injection
Prepared Statement
Stored Procedures
o Vulnerable and Secure Code for Stored Procedures
Stored Procedure for Securing Input Validation
Cross-site Scripting (XSS)
Whitelisting vs Blacklisting
o Vulnerable and Secure Code for Blacklisting & Whitelisting
Regular Expressions
o Vulnerable and Secure Code for Regular Expressions
Character Encoding
Page | 8 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
o Vulnerable and Secure Code for Character Encoding
o Checklist for Character Encoding
Cross-site Scripting (XSS) Countermeasures
HTML Encoding
o Vulnerable and Secure Code for HTML Encoding
HTML Encoding using ESAPI Encoder
Cross-site Request Forgery (CSRF)
o Cross-site Request Forgery (CSRF) Countermeasures
Directory Traversal
o Directory Traversal Countermeasures
HTTP Response Splitting
o HTTP Response Splitting Countermeasures
Parameter Manipulation and Countermeasures
Protecting Application from Log Injection Attack
XML Injection
Command Injection
LDAP Injection
XML External Entity Attack
Unrestricted File Upload Attack
Prevent Unrestricted File Upload: Validate File Extension
Injection Attacks Countermeasures
CAPTCHA
o Sample Code for Creating CAPTCHA
o Sample Code for CAPTCHA Verification
o Sample Code for Displaying CAPTCHA
Best Practices for Input Validation
Module 05: Secure Coding Practices for Authentication and Authorization
Introduction to Authentication
Java Container Authentication
Authentication Mechanism Implementation
Page | 9 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
Types of Authentication
Declarative vs Programmatic Authentication
Declarative Security Implementation
Programmatic Security Implementation
Java EE Authentication Implementation Example
Basic Authentication
How to Implement Basic Authentication?
Form-based Authentication
Form-based Authentication Implementation
Implementing Kerberos-Based Authentication
Secured Kerberos Implementation
Client Certificate Authentication
Certificate Generation with Keytool
Implementing Encryption and Certificates in Client Application
Authentication Weaknesses and Prevention
Brute Force Attack
Web-based Enumeration Attack
Weak Password Attacks
Introduction to Authorization
JEE Based Authorization
o Declarative
o Programmatic
Access Control Model
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-based Access Control (RBAC)
Servlet Container
Authorizing Users by Servlets
EJB Authorization
EJB Authorization Controls
Page | 10 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
Declarative Security with EJBs
Programmatic Security with EJBs
Java Authentication and Authorization (JAAS)
JAAS Features
JAAS Architecture
Pluggable Authentication Module (PAM) Framework
JAAS Classes
JAAS Subject and Principal
Authentication in JAAS
o Authentication Steps in JAAS
Authorization in JAAS
o Authorization Steps in JAAS
Subject Methods doAs() and doAsPrivileged()
Impersonation in JAAS
JAAS Permissions
LoginContext in JAAS
Creating LoginContext
LoginContext Instantiation
JAAS Configuration
Locating JAAS Configuration File
JAAS CallbackHandler and Callbacks
Login to Standalone Application
JAAS Client
LoginModule Implementation in JAAS
Methods Associated with LoginModule
LoginModule Example
Phases in Login Process
Java EE Security
Java EE Application Architecture
Java EE Servers as Code Hosts
Page | 11 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
Declaring Roles
HTTP Authentication Schemes
Authorization Common Mistakes and Countermeasures
Common Mistakes
Authentication and Authorization in Spring Security Framework
Spring Security Framework
Spring Security Modules
Spring Authentication
Storing Username and Password
Securing Authentication Provider
Implementing HTTP Basic Authentication
Form-based Authentication
Implementing Digest Authentication
Security Expressions
URL-based Authorization
JSP Page Content Authorization
JSP Page Content Authorization with Domain Object’s ACL
Method Authorization
Configuring Anonymous Login
Logout Feature Configuration
Remember-Me Authentication
Integrating Spring Security with JAAS
Spring JAAS Implementation
Defensive Coding Practices against Broken Authentication and Authorization
Do Not Store Password in Java String Object
Avoid Cookie based Remember-Me Use Persistent Remember-Me
Implement Appropriate Session Timeout
Prevent Session Stealing by Securing SessionID Cookie
Secure Development Checklists: Broken Authentication and Session Management
Page | 12 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
Module 06: Secure Coding Practices for Cryptography
Java Cryptography
Need for Java Cryptography
Java Security with Cryptography
Java Cryptography Architecture (JCA)
Java Cryptography Extension (JCE)
Encryption and Secret Keys
Attack Scenario: Inadequate/Weak Encryption
Encryption: Symmetric and Asymmetric Key
Encryption/Decryption Implementation Methods
SecretKeys and KeyGenerator
Implementation Methods of KeyGenerator Class
Creating SecretKeys with KeyGenerator Class
Cipher Class
The Cipher Class
Implementation Methods of Cipher Class
Insecure Code for Cipher Class using DES Algorithm
Secure Code for Cipher Class using AES Algorithm
Digital Signatures
Attack Scenario: Man-in-the-Middle Attack
Digital Signatures
The Signature Class
Implementation Methods of Signature Class
The SignedObjects
Implementing Methods of SignedObjects
The SealedObjects
Implementation Methods of SealedObject
Insecure and Secure Code for Signed/Sealed Objects
Java XML Digital Signature
Secure Socket Layer (SSL)
Page | 13 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
Java Secure Socket Extension (JSSE)
SSL and Security: Example 1
SSL and Security: Example 2
JSSE and HTTPS
Insecure HTTP Server Code
Secure HTTP Server Code
Key Management
Attack Scenario: Poor Key Management
Keys and Certificates
Key Management System
KeyStore
Implementation Method of KeyStore Class
KeyStore: Persistent Data Stores
Key Management Tool: KeyTool
Digital Certificates
Certification Authorities
Signing Jars
Signing JAR Tool: Jarsigner
Signed Code Sources
Insecure Code for Signed Code Sources
Secure Code for Signed Code Sources
Hashing
Hashing Algorithms
Securing Hashed Password with Salt
Implementing Hashing with Salt in Spring Security
Java Card Cryptography
Spring Security: Crypto Module
Crypto Module
Spring Security Crypto Module
o Key Generators
Page | 14 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
o PasswordEncoder
Implementing BCryptPasswordEncoder()
Configuring BCryptPasswordEncoder() in Spring Security
JavaScript Object Signing and Encryption (JOSE)
Attacks against JWT, JWS and JWE
Implementing JWS using Jose4J
Implementing JWE using Jose4J
Implementing JWK using Jose4J
Dos and Don’ts in Java Cryptography
Dos and Don’ts
o Avoid using Insecure Cryptographic Algorithms
o Avoid using Statistical PRNG, Inadequate Padding and Insufficient Key Size
o Implement Strong Entropy
o Implement Strong Algorithms
Best Practices for Java Cryptography
Module 07: Secure Coding Practices for Session Management
Session Management
Session Tracking
Session Tracking Methods
o HttpSession
o Cookies
Setting a Limited Time Period for Session Expiration
Preventing Session Cookies from Client-Side Scripts Attacks
o URL Rewriting
Example Code for URL Rewriting
o Hidden Fields
o Session Objects
Session Management in Spring Security
Spring Session Management
Session Management using Spring Security
Page | 15 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
Restricting Concurrent Sessions per User using Spring Security
Controlling Session Timeout
Prevent using URL Parameters for Session Tracking
Prevent Session Fixation with Spring Security
Use SSL for Secure Connection
Session Vulnerabilities and their Mitigation Techniques
Session Vulnerabilities
Types of Session Hijacking Attacks
Countermeasures for Session Hijacking
Countermeasures for Session ID Protection
Best Practices and Guidelines for Secured Sessions Management
Best Coding Practices for Session Management
Checklist to Secure Credentials and Session IDs
Guidelines for Secured Session Management
Module 08: Secure Coding Practices for Error Handling
Introduction to Exceptions
Exception and Error Handling
o Checked Exceptions
o Unchecked Exceptions
Example of an Exception
Handling Exceptions in Java
Exception Classes Hierarchy
Exceptions and Threats
Erroneous Exceptional Behaviors
Suppressing or Ignoring Checked Exceptions
Disclosing Sensitive Information
Logging Sensitive Data
Restoring Objects to Prior State, if a Method Fails
Avoid using Statements that Suppress Exceptions
Prevent Access to Untrusted Code that Terminates JVM
Page | 16 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
Never Catch java.lang.NullPointerException
Never Allow methods to Throw RuntimeException, Exception, or Throwable
Never Throw Undeclared Checked Exceptions
Never Let Checked Exceptions Escape from Finally Block
Dos and Don'ts in Error Handling
Dos and Don'ts in Exception Handling
Avoid using Log Error and Throw exception at Same Time
Spring MVC Error Handling
Handling Controller Exceptions with @ExceptionHandler Annotation
Handling Controller Exceptions with HandlerExceptionResolver
Spring MVC: Global Exception Handling
Global Exception Handling: HandlerExceptionResolver
Mapping Custom Exceptions to Statuscode with @ResponseStatus
Configure Custom Error Page in Spring MVC
Exception Handling in Struts 2
Exception Handling: Struts 2
Best Practices for Error Handling
Best Practices for Handling Exceptions in Java
Introduction to Logging
Logging in Java
Example for Logging Exceptions
Logging Levels
Logging using Log4j
Log4j and Java Logging API
Java Logging using Log4j
Secure Coding in Logging
Vulnerabilities in Logging
Logging: Vulnerable Code and Secure Code
Secured Practices in Logging
Page | 17 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
Module 09 Static and Dynamic Application Security Testing (SAST & DAST)
Static Application Security Testing
Static Application Security Testing (SAST)
Objectives of SAST
Why SAST
Skills required for SAST
What to look for in SAST
Common Vulnerabilities Identified Through SAST
Types of SAST
o Automated Source Code Analysis
o Manual Source Code Review
Where does Secure Code Review Fit in SDLC?
SAST Steps
SAST Activities- flow Chart
Recommendation for Effective SAST
SAST Deliverable
Automated Source Code Analysis
o Static Code Analysis using Checkmarx Static Code Analysis
o Static Code Analysis using Visual Code Grepper (VCG)
o Static Code Analysis using HP Fortify
o Static Code Analysis using Rational AppScan Source Edition
Selecting Static Analysis Tool
Manual Secure Code Review
Manual Secure Code Review for Most Common Vulnerabilities
Code Review for PCI DSS Compliance
Code Review for Blacklisting Validation Approach
Code Review for Client-side Validation Approach
Code Review for Non-parametrized SQL Query
Code Review for XSS Vulnerability
Code Review for Weak Password Authentication
Page | 18 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
Code Review for Hard-coded Passwords
Code Review for Empty Password in Connection String
Code Review for Insecure Basic Authentication
Code Review for Open Redirect
Code Review for Insecure LDAP Authentication
Code Review for Insecure Authorization Mechanism
Code Review for Weak Password Length
Code Review for use of Weak Hashing Algorithm
Code Review for Use of Weak Random Number Generator
Code Review for Use of Insecure PBE Work Factor
Code Review for use of Weak Encryption Algorithm
Code Review for Use of Insufficient Encryption Key Size
Code Review for Unsafe Decoding
Code Review for Use of SSL
Code Review for OS Command Injection
Code Review for LDAP Injection
Code Review for XML Injection
Code Review for Unsafe use of request parameter to execute SQL Query
Code Review for Insecure File Upload
Code Review for Directory Traversal
Code Review for Sensitive Information Exposure
Code Review for Sensitive Information Leakage
Code Review for Generic Exception Throwing and Catching
Code Review for Cookies Vulnerable to Client-side Scripts Attacks
Code Review for Cookies Vulnerable to CSRF Attacks
Code Review for Enabling Directory Listing
Code Review: Check List Approach
Sample Checklist
o Input Validation
o Authentication
Page | 19 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
o Authorization
o Session Management
o Cryptography
o Exception Handling
o Logging
SAST Finding
SAST Report
SAST Reporting
Dynamic Application Security Testing (DAST)
Types of DAST
o Automated Application Vulnerability Scanning
o Manual Application Penetration Testing
SAST Vs DAST
Automated Application Vulnerability Scanning Tools
Web Application Security Scanners
o WebInspect
o IBM SecurityAppScan
Additional Web Application Vulnerability Scanners
Proxy-based Security Testing Tools
Burp Suite
OWASP Zed Attack Proxy (ZAP)
Additional Proxy-based Security Testing Tools
Choosing Between SAST and DAST
Module 10: Secure Deployment and Maintenance
Secure Deployment
Prior Deployment Activity
Check the Integrity of Application Package Before Deployment
Review the Deployment Guide Provided by the Software Vendor
Deployment Activities: Ensuring Security at Various Levels
Ensuring Security at Host Level
Page | 20 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
Check and Configure the Security of Machine Hosting Web Server, Application
Server, Database Server and Network Devices
Physical Security
Host Level Security
Ensuring Security at Network Level
Network Level Security
o Router
o Firewall
o Switch
Ensuring Security at Application Level
Web Application Firewall (WAF)
o Benefits of WAF
o WAF Limitations
o WAF Vendors
Ensuring Security at Web Container Level (Tomcat)
Install and Configure Tomcat Securely
Remove Server Banner
Start Tomcat with Security Manager
Configure Default Servlet Not to Serve Index Pages
Replace Default Error Page
Replace Default server.xml
Protect Shutdown Port
Restrict Access to Tomcat Manager Applications
Protecting Resources with Realms
Store Passwords as Digest
Do Not Run Tomcat as Root
Configure Restricted Datasets
Session Handling using App Mode in Tomcat
Role Based Security
Securing Tomcat at Network level
Java Runtime Security Configurations
Page | 21 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
Tomcat General Security Setting
Verify Trace Element Setting in sever.xml
Verify CustomError Settings in web.xml
Verify maxPostSize Setting
Tomcat Security Checklist
Checklist for Security Configuration in server.xml File in Apache Tomcat
Tomcat High Availability
Best Practices for Securing Tomcat
Ensuring Security in Oracle
Oracle Database General Security Overview
Methods of Authentication in Oracle
Authentication by Oracle Database
Oracle Security Features
Default Database Installation and Configuration Security
Managing User Accounts Securely for the Site
Securing User Accounts
Password Management
Lock all Expired Accounts
Assign Users to Password Profile
Disable Remote Operating System Authentication
Securing Data
Restrict Access to Operating System Directories
Securing Database Installation and Configuration
Securing Network
How to Configure Encryption on the Client and the Server
Control Access Data
Virtual Private Database
Oracle Label Security
Database Vault
o Management and Reports
Page | 22 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Application Security Engineer
Course Outline
o Disabling the Recycle Bin
Audit Vault
Built-in Audit Tools
o Standard Database Auditing
Standard Auditing Enable Network Auditing
o Value Based Auditing
o Fine Grained Auditing (FGA)
Recommended Audit Settings
Security Maintenance and Monitoring
Post Deployment Activities: Security Maintenance and Monitoring
Security Maintenance Activities at OS Level
Security Maintenance Activities at Web Container Level
Security Maintenance Activities at Application Level
Page | 23 Certified Application Security Engineer Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.