HTML5 Security Learning Path

Learn how HTML5 security provides a first line of defense in your web applications.

7 hours, 9 minutes

Quick facts

About this learning path

  • courses

    100% online

  • Duration

    7 hours, 9 minutes

  • Assessment

    questions

About HTML5 Security

HTML5 Security will teach you how to secure your web applications. You will learn first about the components that make up an HTML5 application, before being given the ability to identify, assess and resolve threats to these components. Finally you will put your knowledge in to practice by securing a sample application.

This course is made up of 4 main courses: HTML5 components - a guide to the components that you will need to know about. Identifying areas of HTML5 vulnerability - How to identify and assess the common types of HTML5 attacks Web app protection using HTML5 - Prevention, response and resolution of HTML5 vulnerabilities Problem based approach - Bug bounty report resolution exercise On completion of this learning path, you will have gained a comprehensive understanding of HTML5 components security that will enable you to secure your web applications with confidence.

 

Syllabus

HTML5 Security Skill Assessment

Assessment - 16 questions

Introduction to HTML5 Security

Course - 00:29:00

You will discover why HTML5 Security is perhaps the most fundamental and often misunderstood aspect of web application security. On completion you will have gained a brief understanding of the different types of HTML5 attacks which will lay the foundation for this course.
HTML5 Elements

Course - 01:16:00

On completion of this course, you will be able to evaluate HTML5 components and justify the reason for their use in a web application. Using this knowledge, you will be able to identify common areas of vulnerabilities, then offer solutions to prevent these from becoming attacks.
Identifying areas of HTML5 vulnerability

Course - 01:09:00

This course will teach you the most common types of attack arising from insecure HTML5 code and the methods used by hackers to exploit them.
Web app protection using HTML5

Course - 02:39:00

Analyze existing HTML5 code for security vulnerabilities and correct them. Create resilient HTML5 code that does not include security vulnerabilities.
HTML5 Security in the wild - a Problem based approach

Course - 01:30:00

Our application was just launched in beta. As part of the launch, you have opened up a bug bounty program through which ethical hackers can report security vulnerabilities in return for a bug bounty payment. Your job is to assess these reports and resolve them.

Meet the author

Robert Morel

Robert Morel is a Co-founder and Chief Technology Officer (CTO) of PointlessAI, a bug bounty and vulnerability disclosure platform (VDP) servicing AI projects. Previously, Robert worked as Head of Application Security for a large enterprise, as a Security Operations Lead for a cryptocurrency futures exchange and, prior to this, as a Senior Web Developer and IT Security Officer.

While at university, Robert started his own web development company. His first website was a static HTML site advertising a plumber. His student prices attracted business, and by the end of university, he had a team of five specializing in developing angular single-page applications and training courses.

Most of Robert’s work since then has been within fintech and blockchain. His first role after university involved migrating large financial data sets from legacy silos onto the blockchain, using Java. Working in fintech, he became an expert in developing secure and hardened web applications. Through this, he also became an experienced security researcher and ethical hacker, as well as a fintech author and blogger.

One of Robert’s favorite parts of working in web app security is having the opportunity to work with penetration testers and bug bounty hunters. Managing, assessing and resolving security reports has taught him more than ever about vulnerabilities and exploits. In his spare time, Robert enjoys developing web-scraping applications, practicing the violin and Chinese calligraphy.

The details

Learning path insights

How to claim CPEs

Should you complete this learning path, you’ll be able to download a certificate of completion. Use this to claim your CPEs or CPUs.

No software. No set up. Unlimited access.

Skip the server racks and spin up a realistic environment with one click. Infosec Skills cyber ranges require no additional software, hardware or server space so your team can spend less time configuring environments and more time learning. Unlimited cyber range access is included in every Infosec Skills subscription so your team can skill up however they learn best.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo