This study plan is based on milestones. So, check how much you can cover within the timeline. The more you cover the topics, the better candidate you are for the job role. Also, I assume you have already checked and are comfortable with Common Security Skills study plan.
Just to make sure that everyone understands what you need to learn to be an Application Security Engineer. Application Security is different from Web Security or commonly people think it as offensive security or pentesting. Though it needs some concepts aligned with pentester, it's altogether a totally different skill set.
It is more towards shift left security including Threat Modeling, Secure Code Review, Secure Code Design, Training Developers, taking care of overall SDL process, and of course OWASP Top 10 web and API security. I have another page specifically for "API Security Study Plan" because that skill also needs good time to learn.
- AppSec is not Pentesting (Penetration Testing) or Web Security (people use it generically).
- Think more of a combination of developer and attacker
- Talking to developers, giving training to them or going through the code should not scare you.
- Tougher than Pentesting (Topic of debate for another day)
- Can write code for PoC, Exploit or demo with comfort
- API security should be your area of interest.
Usually it will take you 6-12 months to be good at the Application Security fundamentals to get a job at entry level.
- Web Application Concepts - 6 weeks
- Threat Modeling - 2-3 weeks
- Secure Code Review - 6-8 weeks
- Cryptography - 3 weeks
- Security Development Lifecycle (SDL) - 4 weeks
- Books
- Videos
- Courses - Try to complete at least 1-2 courses (1-2 months)
- Certifications - on your bandwidth and wish
- Interview Questions
- Application Security Tools
- Whom to follow on Twitter
This topic will have an overlap with the concepts required for Pentesting, but you have to now think more of a defender than offender. Go with your pace, but make sure you understand the basic web security concepts very well like HTTP Security Response headers, Bruteforce, CSRF, Injection, JWT, Cryptography, Hashing, Encoding etc.
- Understanding of various HTTP methods, PUT vs POST, UPDATE vs PATCH, leverage OPTIONS method
- Ability to understand response status codes.
- what if you got 200, when you tried something malicious
- what can we do if we get 403
- let's try to get 500 status code, and why so? What will it reveal?
- Try to understand each status code which as a pentester you would love to see.
- Understand HTTP headers very well, especially response headers. You would need it more often while doing pentest.
- TCP 3 way handshake
- How SSL works
- Basics of security terminologies
- Essentials Security Concepts
You can find the majority of the security concepts at OWASP Cheatsheet
Understand the fundamental concepts on what it is, how it can be vulnerable and how you can either exploit it or mitigate it.
- Understanding how proper implementation of AuthN and AuthZ contribute to robust security. What can an attacker do to exploit it and how to mitigate/defend it
- How session and cookies work and how it can be vulnerable, bypassed or even exploited
- Understand how session management can be more secured
- In-depth understanding of XSS from both perspective exploit and mitigation
- REST concepts like CRUD.
- Different types of injections specially SQLi, RFI,LFI, RCE
- Mass Assignment
- Concepts like rate limit, bruteforce, replay attack, MITM, session fixation, session hijack, credential stuffing
- CORS concepts
- How can you prevent SSRF attacks
- JWT Tokens in depth
- Basic of encoding, decoding, hashing
- Good understand of Cryptography and its implementation in application
- SAST vs SCA
- Very good at OWASP Top 10 for Web 2021 and OWASP Top 10 for API: 2019
- Go through OWASP Secure Code Review Guide, understand what to verify and how to use this guide.
- Very good at OWASP ASVS (Application Security Verification Standard), it's your job to make every developer aware about it and must use while development.
- Go through OWASP Software Assurance maturity Model (OSAMM), if you aim for a security architect role.
- Understand what causes BOLA and BFLA and try to be good at testing these vulnerabilities.
- Various weak cipher suites, how to test, how to make developers aware about it
- Authentication and Authorization
- Advanced SQL Injection
- XML Injection, JSON Injection
- Understand SAML and LDAP Injection
- NoSQL Injection
- GraphQL Injection
- XXE Attacks
- Server-side Template Injection
- Deserialization
- CSP: Content Security Policy
Read Threat Modeling Study Plan
Read Secure Code Review
Read Cryptography
Read Security Development Lifecycle
- Agile Application Security
- Application Security Program Handbook
- Writing Secure Code
- The Tangled Web: A Guide to Securing Modern Web Applications
- Alice and Bob Learn Application Security
- OWASP Code Review Guide
- Introduction to Application Security
- Scaling your AppSec Program with semgrep
- Building an AppSec Program from the ground up by Snyk
- Application Security - Understanding, Exploiting and Defending against Top Web Vulnerabilities by Cerner
- Securing Web Application
- Web Application Security: 10 things developers need to know
- Application Security from SANS Institute
- Software Security on Coursera
- Cloud Application Security
- Application Security Guide - Udemy
- Sec522: Application Security: Securing Web Apps, APIs, and Microservices from SANS Really nice one but costly.
- Free OWASP Top 10 practice from Kontra Security
- CSSLP: Certified Secure Software Lifecycle Professional Recommended
- CASE: Certified Application Security Engineer for Java and .NET professionals
- GWEB: GIAC Certified Web Application Defender
Possible Application Security interview questions is shared at different github repo to keep it aligned with career roadmap guide.
- Checkmarx for SAST or HCL AppSCan (Previously it was IBM AppScan)
- Snyk Code for SAST and Snyk Open Source for SCA
- git-secrets or gitleaks or trufflehog to find out secrets
- Chef Inspec
- OWASP Dependency Check is for SCA
- Bandit for python code
- Sonarqube for SAST with few plugins like findsecbugs
- RetireJS for JS libraries
- Contrast for IAST solution
- Coverity from Snyopsys
- You must not ignore Burp Suite Pro
- Veracode
- InSight from Rapid7
Why twitter? Because you will see lots of security professionals very active here and sharing cool stuff often.