Learning Path: Application Security Essentials

Injections, XXE, and Insecure Deserialization

Understanding the core principles of Application Security is the difference between building software that’s secure and one that’s easily exploitable.  This course is a deep dive into some of the most common and frequently occurring vulnerabilities your applications are likely to have over the course of development.

This course, Injections, XXE, and Insecure Deserialization, contains 5 modules, each dealing with a different common vulnerability. To begin, we’ll take you through real-world techniques of how to attack applications using Injection flaws, XML External Entities (XXE), Insecure Deserialization and Server-Side Request Forgery (SSRF). 

Next, we’ll counter these with battle-tested strategies to defend against each of them. Every module is packed with hands-on labs that you’ll do alongside the trainer. This ensures you get practical experience dealing with real-world vulnerabilities as you’re learning about them. 

At the end of this course, you’ll come away with a comprehensive understanding of some of the most commonly occurring vulnerabilities that affect applications today. You’ll be able to take everything you’ve learned about Injection vulnerabilities, XXE, and Insecure Deserialization and implement it in a modern development environment. 

Proficiency: Beginner
Graphical icon for XXE, Insecure deserialization courses
Audience: Application Security
Course Duration: 4 hours
34 lessons
5 Cloud Labs

Course Outline

  • Course Introduction
  • Course Pre-requisites
  • Introduction and Overview – Injection Flaws
  • Introduction – SQL Injection
  • SQL Injection – Additional Exploits
  • Protecting against SQL Injections – Parameterized Queries
  • Protecting against SQL Injection – ORM and other controls
  • Server-Side Template Injection – Overview
  • Server-Side Template Injection – Attack and Defense
  • Introduction and Overview – XML External Entities (XXE)
  • Defending against XXE
  • Intro and Overview – Insecure Deserialization
  • Insecure Deserialization – Real-world attacks
  • Defending against Insecure Deserialization