This study plan is based on milestones. So, check how much you can cover within the timeline. The more you cover the topics, the better candidate you are for the job role. Also, I assume you have already checked and comfortable with Common Security Skills study plan.
Just to make sure that everyone understands what you need to learn to be an Application Security Engineer. Application Security is different from Web Security or commonly people think it as offensive security or pentesting. Though it needs some concepts aligned with pentester but it's altogether a totally different skill sets.
It is more towards shift left security including Threat Modeling, Secure Code Review, Secure Code Design, of course OWASP Top 10 web and API security. I have another page specifically for "API Security Study Plan" because that skill also needs good time to learn.
In short:
- AppSec is not Pentesting or Web Security (people use it generically).
- Think more of a combination of developer and attacker
- Talking to developers, giving training to them or go through the code should not scare you.
- Tougher than Pentesting (Topic of debate for another day)
- Can write code for PoC, Exploit or demo with comfort
- API security should be your areas of interest.
Usually it will take you 6-12 months to be good at the Application Security fundamentals to get a job at entry level.
- Web Application Concepts - 6 weeks
- Threat Modeling - 2-3 weeks
- Secure Code Review - 6-8 weeks
- Cryptography - 3 weeks
- Security Development Lifecycle (SDL) - 4 weeks
- Books
- Videos
- Courses - Try to complete at least 1-2 courses (1-2 months)
- Certifications - on your bandwidth and wish
- Interview Quesitons
- Networking Matters
- Whom to follow on Twitter
This topic will have an overlap with the concepts required for Pentesting, but you have to now think more of a defender than offender. Go with your pace, but make sure you understand the basic web security concepts very well like HTTP Security Response headers, Bruteforce, CSRF, Injection, JWT, Cryptography, Hashing, Encoding etc.
- Understanding of various HTTP methods, PUT vs POST, UPDATE vs PATCH, leverage OPTIONS method
- Ability to understand response status codes.
- what if you got 200, when you tried something malicious
- what can we do if we get 403
- let's try to get 500 status code, and why so? What will it reveal.
- Try to understand each status code which as a pentester you would love to see.
- Understand HTTP headers very well, specially response headers. You would need it more often while doing pentest.
- TCP 3 way handshake
- How SSL works
- Basics of security terminologies
- Essentials Security Concepts
You can find majority of the security concepts at OWASP Cheatsheet
Understand the fundamental concepts on what it is, how it can be vulnerable and how you can eitehr epxloit it or mitigate it.
- Understanding how proper implementation of AuthN and AuthZ contribute to robust security. What can an attacker do to exploit it and how to mitigate/defend it
- How session and cookies work and how it can be vulnerable, bypassed or even exploited
- Understand how session management can be more secured
- In-depth understanding of XSS from both perspective exploit and mitigation
- REST concepts like CRUD.
- Different types of injections specially SQLi, RFI,LFI, RCE
- Mass Assignment
- Concepts like rate limit, bruteforce, replay attack, MITM, session fixation, session hijack, credential stuffing
- CORS concepts
- How can you prevent SSRF attacks
- JWT Tokens in depth
- Basic of encoding, decoding, hashing
- Good understand of Cryptography and its implementation in application
- SAST vs SCA
- Very good at OWASP Top 10 for Web and API
- Go through OWASP Secure Code Review Guide, understand what to verify and how using this guide.
- Very good at OWASP ASVS (Application Security Verification Standard), it's your job to make every developer aware about it and must use while development.
- Go through OWASP Software Assurance maturity Model (OSAMM), if you aim for a security architect role.
- Understand what causes BOLA and BFLA and try to be good at testing these vulnerabilities.
- Various weak cipher suites, how to test, how to make developers aware about it
- Authentication and Authorization
- Advanced SQL Injection
- XML Injection, JSON Injection
- Understand SAML and LDAP Injection
- NoSQL Injection
- GraphQL Injection
- XXE Attacks
- Template Injection
- Deserialization
- CSP: Content Security Policy
- Agile Application Security
- Application Security Program Handbook
- Writing Secure Code
- The Tangled Web: A Guide to Securing Modern Web Applications
- Alice and Bob Learn Application Security
- OWASP Code Review Guide
- Software Security on Coursera
- Cloud Application Security
- Application Security Guide - Udemy
- Sec522: Application Security: Securing Web Apps, APIs, and Microservices from SANS Really nice one but costly.
- CSSLP: Certified Secure Software Lifecycle Professional Recommended
- CASE: Certified Application Security Engineer for Java and .NET professionals
- GWEB: GIAC Certified Web Application Defender
Read Threat Modeling Study Plan
Read Secure Code Review
Read Cryptography
Read Security Development Lifecycle
Possible Application Security interview questions is shared at different github repo to keep it aligned with career roadmap guide.
- Checkmarx for SAST or HCL AppSCan (Previously it was IBM AppScan)
- Snyk Code for SAST and Snyk Open Source for SCA
- git-secrets or gitleaks or trufflehog to find out secrets
- Inspec
- OWASP Dependency Check is for SCA
- Bandit for python code
- Sonarqube for SAST with few plugins like findsecbugs
- RetireJS for JS libraries
- Contrast for IAST solution
- Coverity from Snyopsys
- You must not ignore Burp Suite Pro
- Veracode
- InSight from Rapid7
Once you are on track and now understands the heat, it's time to:
- Make some good LinkedIn contacts from application security domain
- Find a mentor or follow someone who shares blogs, tutorials, talks on these topics.
- Make connections through various security conference online/offline
- Publish some good appsec articles, may be basic concepts, but you must publish. Choose medium.com or something of your choice.
- Join webinars, conferences, newsletters.
- Help someone who is still a beginner or struggling to understand appsec concepts. You will even learn better while guiding/helping others.
By the time you cover all these checklists, you will be already on a way to have a good start in web security job role. All the best!
Why twitter? Because you will see lots of security professionals very active here and sharing cool stuffs often.