💡
L3preparation
search
⌘Ctrlk
💡
L3preparation
  • Initial Page
  • Cribs
  • English
  • Questions
  • Answering quide
  • Technical requirements
    • NodeJS
    • Clouds
    • Team management and Soft skills
    • Estimations
    • Software Development Life Cycle
    • Git
    • Release Strategies
    • Git workflows
    • CI vs. CD vs. CD
    • Quality
    • Patterns
    • Software Architecture
    • Mobile development approaches
    • Micro Frontends
    • Monorepo
    • e2e frameworks
    • SSR vs CSR
    • FE FRAMEWORKS
    • SPA vs MPA
    • PWA & AMP
    • Web Accessibility
    • Web Animations
    • Responsive design
    • CSS Frameworks
    • CSS Methodologies
    • CSS (Pre/Post)processors
    • CSS Fundamentals
    • Tools (NPM, Webpack, Chrome DevTools, ...)
    • Browser API
    • Performance
    • Security
      • Man-in-the-Middle (MITM) Attacks
      • OWASP Top 10
      • CSRF
      • CSP
      • Auth (JWT, OAuth, Basic, etc.)
      • SQL injections
      • CORS
      • XSS
    • Communication protocols
    • Programing paradigms
    • Languages
    • Computer science
  • Soft skills
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Technical requirements

Security

hashtag
Content:

  • XSS

  • CORS

  • SQL injections

  • Auth (JWT, OAuth, Basic, etc.)

  • CSP

  • CSRF

  • OWASP Top 10

  • Man-in-the-Middle (MITM) Attacks

hashtag
Materials:

  • OWASP Top 10arrow-up-right

  • CORSarrow-up-right

  • Same origin policy and CORSarrow-up-right

  • Auth Typesarrow-up-right

  • Security Headers:

    • https://www.netsparker.com/blog/web-security/http-security-headers/arrow-up-right

    • https://habr.com/en/post/499342/arrow-up-right

  • Security scanningarrow-up-right

  • SSL scanningarrow-up-right

  • https://web.stanford.edu/class/cs253/arrow-up-right

PreviousJavaScript Profiling and Debuggingchevron-leftNextMan-in-the-Middle (MITM) Attackschevron-right

Last updated 4 years ago

  • Content:
  • Materials: