Certified AppSec Practitioner (CAP) Exam: Certification Syllabus - Video Tutorials
Certified Appsec Practitioner (CAP)
Certified Appsec Practitioner (CAP) is an intermediate-level exam to test attendees’ knowledge on the core concepts of application security.
The SecOps Group is a globally recognized IT security company having vast experience of providing cyber security consultancy and education services.
Certification Syllabus - Video Tutorials
1. Input Validation Mechanism
- Input validation mechanisms are techniques or processes used to ensure that data entered or provided by users or external sources is correct, secure, and conforms to the expected format or criteria.
- The purpose of input validation is to prevent erroneous, malicious, or unexpected data from causing issues or vulnerabilities in a system.
Whitelist Filtering:
- This approach allows only specific types of input to be accepted, filtering out any input that does not match the predefined criteria.
Blacklist Filtering:
- In contrast to whitelist filtering, blacklist filtering blocks specific types of input that are known to be potentially harmful or malicious.
Input validation attack
- Input validation attacks are a method of cyberattack in which the attacker injects malicious input that can be interpreted and executed by a target system to exploit its vulnerabilities.
- Input validation attacks can employ a variety of input types such as code, scripting, and commands.
- The most common input validation attack types are buffer overflow attacks, canonicalization attacks, cross-site scripting (XSS) attacks, and SQL injection (SQLi) attacks.
2. Cross-Site Scripting- Cross-site scripting (also known as XSS) is a web security vulnerability that allows an attacker to compromise the interactions that users have with a vulnerable application.
- Cross-site scripting works by manipulating a vulnerable web site so that it returns malicious JavaScript to users. When the malicious code executes inside a victim's browser, the attacker can fully compromise their interaction with the application.
- Cross-site scripting (also known as XSS) is a web security vulnerability that allows an attacker to compromise the interactions that users have with a vulnerable application.
- Cross-site scripting works by manipulating a vulnerable web site so that it returns malicious JavaScript to users. When the malicious code executes inside a victim's browser, the attacker can fully compromise their interaction with the application.
Reflected cross-site scripting
Reflected XSS is the simplest variety of cross-site scripting. It arises when an application receives data in an HTTP request and includes that data within the immediate response in an unsafe way.
Reflected XSS is the simplest variety of cross-site scripting. It arises when an application receives data in an HTTP request and includes that data within the immediate response in an unsafe way.
Stored cross-site scripting
Stored XSS (also known as persistent or second-order XSS) arises when an application receives data from an untrusted source and includes that data within its later HTTP responses in an unsafe way.
Stored XSS (also known as persistent or second-order XSS) arises when an application receives data from an untrusted source and includes that data within its later HTTP responses in an unsafe way.
DOM-based cross-site scripting
DOM-based XSS (also known as DOM XSS) arises when an application contains some client-side JavaScript that processes data from an untrusted source in an unsafe way, usually by writing the data back to the DOM.
3. SQL Injection
DOM-based XSS (also known as DOM XSS) arises when an application contains some client-side JavaScript that processes data from an untrusted source in an unsafe way, usually by writing the data back to the DOM.


Comments
Post a Comment