diff --git a/2. Curriculum.md b/2. Curriculum.md index 363906e..9330a27 100644 --- a/2. Curriculum.md +++ b/2. Curriculum.md @@ -20,6 +20,17 @@ Modules: Below is a more detailed view of the modules +<<<<<<< HEAD +Module 1: Secure Architecture and Threat Modeling\ +         STRIDE, DREAD, LINDDUN\ +         Data Flow Diagrams (DFDs)\ +         Trust boundaries\ +         Secure SDLC practices\ +         Common design flaws +         Core security principles (Least Privilege, Defense in Depth, Fail Securely)\ +         Attack surface reduction\ +         Secure design patterns (e.g., secure defaults, centralized security controls) +======= Module 1: Secure Architecture and Threat Modeling         STRIDE, DREAD, LINDDUN         Data Flow Diagrams (DFDs) @@ -210,6 +221,7 @@ Module 3: Authorisation   - Use a dedicated XPath API that handles parameters securely instead of building XPath queries with string concatenation. +>>>>>>> main @@ -297,9 +309,19 @@ Module 6: Error Handling         Logging sensitive operations securely         Avoiding stack traces/info leaks +<<<<<<< HEAD +Module 7: Secure Logging\ +         Log protection (tamper resistance)\ +         Real-time alerting and monitoring\ +         What to log (security events) vs. what not to log (PII, secrets)\ +         Log sanitization to prevent log injection\ +         Standardized log formats (e.g., JSON, CEF)\ +         Secure log storage, access controls, and retention policies +======= Module 7: Secure Logging         Log protection (tamper resistance)         Real-time alerting and monitoring +>>>>>>> main Module 8: Data Protection and Privacy         TLS enforcement @@ -314,12 +336,24 @@ Module 9: Secure Communications         Certificate pinning         Secure protocol selection +<<<<<<< HEAD +Module 10: Malicious Code, Supply Chain and Open Source Software\ +         Dependency management (SCA tools like OWASP Dependency-Check)\ +         Secure deserialization\ +         Subdomain takeover\ +         Code signing and verification\ +         Open source software and licensing\ +         Understanding Software Bill of Materials (SBOM)\ +         Dependency confusion and typosquatting attacks\ +         Verifying dependency integrity (checksums, signatures) +======= Module 10: Malicious Code, Supply Chain and Open Source Software         Dependency management (SCA tools like OWASP Dependency-Check)         Secure deserialization         Subdomain takeover         Code signing and verification         Open source software and licensing +>>>>>>> main Module 11: Business Logic Security         Logical flaws (race conditions, inconsistent state) @@ -332,6 +366,35 @@ Module 12: Secure File and Resource Handling         RFI, SSRF protections         MIME sniffing and validation +<<<<<<< HEAD +Module 13: API and Web Service Security\ +         REST, GraphQL, and SOAP security models\ +         Authentication and authorization for APIs\ +         Throttling and abuse protection\ +         JSON and XML parser safety\ +         Common API vulnerabilities (BOLA, Mass Assignment, Excessive Data Exposure)\ +         API input and output validation (schema validation)\ +         Use of API Gateways for security enforcement + +Module 14: Secure Configuration and Deployment\ +         Secure defaults\ +         Secrets management (vaults, env vars)\ +         CORS, CSP, HSTS\ +         CI/CD pipeline security (SAST/SCA/SBOM integration, pipeline permissions)\ +         Infrastructure as Code (IaC) security\ +         Container security (image scanning, Dockerfile hardening)\ +         Hardening web and application server configurations + +Module 15: Security of and for AI\ +         Understanding the OWASP Top 10 for LLMs\ +         Prompt Injection (Direct and Indirect)\ +         Insecure Output Handling from models\ +         Training Data Poisoning\ +         Model Denial of Service (DoS) and Evasion Attacks\ +         Model Theft, Inversion, and Extraction\ +         Secure MLOps practices (securing the ML pipeline)\ +         Privacy-Preserving ML (e.g., Federated Learning, Differential Privacy) +======= Module 13: API and Web Service Security         REST, GraphQL, and SOAP security models         Authentication and authorization for APIs @@ -348,3 +411,4 @@ Module 15: Security of and for AI         Securing models         Securing datasets +>>>>>>> main