Security Tutorials

Browser engines, DOM and CSSOM processing, critical rendering paths, and tips for improving web performance.

All Security Tutorials

Access Control

Authentication vs Authorization: What Is the Difference?

Learn the difference between authentication and authorization and how they verify identity and control user access in web applications.

View Tutorial

Session vs Token Authentication: Key Differences

Learn the difference between session-based and token-based authentication and how they manage secure user access in modern applications.

View Tutorial

JWT: JSON Web Token Complete Guide

Learn what JWT is, how it encodes user data into a secure token, and how it is used for stateless authentication in modern web applications and APIs.

View Tutorial

OAuth: How Secure Third-Party Login Works

Learn what OAuth is, how it allows secure third-party login without sharing passwords, and how it powers Login with Google and Login with Facebook.

View Tutorial

Authentication Mechanisms: Methods and Best Practices

Learn different authentication mechanisms such as passwords, tokens, multi-factor authentication, and OAuth, and how they secure user identity in web applications.

View Tutorial

Authorization: Access Control

Learn what authorization is, how it controls access to resources, and how methods like RBAC, ACL, and ABAC enforce permissions after authentication.

View Tutorial

RBAC Tutorial: Role-Based Access Control

Learn RBAC step by step, how roles and permissions work, and how to implement role-based access control in your application.

View Tutorial

Session Management

Session Lifecycle: How Web Sessions Work

Learn how web sessions are created, maintained, and destroyed, and how session management keeps users logged in across multiple page requests.

View Tutorial

Common Attacks

CSRF Attack: Cross-Site Request Forgery

Learn what CSRF (Cross-Site Request Forgery) is, how attackers trick users into performing unwanted actions, and how to prevent CSRF attacks in web applications.

View Tutorial

XSS Attack: Cross-Site Scripting

Learn what Cross-Site Scripting (XSS) is, how attackers inject malicious scripts into websites, and how to prevent XSS vulnerabilities in web applications.

View Tutorial

SQL Injection: How It Works and Prevention

Learn what SQL injection is, how attackers manipulate database queries, and how developers can prevent SQL injection vulnerabilities in web applications.

View Tutorial

Browser Security

Content Security Policy (CSP): What It Is and How It Works

Learn what Content Security Policy (CSP) is, how it prevents XSS attacks, and how to configure security headers to control which resources a browser can load.

View Tutorial

CORS: Cross-Origin Resource Sharing

Learn what CORS is, why browsers block cross-origin requests by default, and how servers configure headers to allow safe cross-origin communication.

View Tutorial

Same-Origin Policy: Browser Security Basics

Learn what the same-origin policy is, why browsers enforce it, and how it prevents malicious scripts from accessing data across different domains.

View Tutorial

Security Headers: Protecting Your Web Application

Learn what security headers are, how they protect web applications, and how headers like CSP, HSTS, X-Frame-Options, and X-Content-Type-Options improve security.

View Tutorial

Subresource Integrity (SRI): How It Protects Your Website

Learn what Subresource Integrity (SRI) is, how it ensures external resources are not tampered with, and how to use integrity attributes for secure script and style loading.

View Tutorial

Data Protection

Password Hashing: How It Works and Why It Matters

Learn what password hashing is, how it secures user passwords, and why techniques like salting and hashing algorithms are essential for web security.

View Tutorial

Cryptographic Hashing: A Complete Beginner Guide

Learn what cryptographic hashing is, how hash functions work, and why hashing is essential for password storage, data integrity, and digital signatures.

View Tutorial

Encryption

SSL and TLS: How Website Encryption Works

Learn what SSL and TLS are, how they encrypt data between browsers and servers, and why they are essential for secure websites.

View Tutorial

SSL Certificates: What They Are and How to Get One

Learn what an SSL certificate is, how it verifies a website identity, the types of certificates available, and how to obtain one for your site.

View Tutorial

Symmetric vs Asymmetric Encryption: Key Differences

Learn the difference between symmetric and asymmetric encryption, how each works, and how they are used to protect data in modern web security.

View Tutorial

Encryption: How It Protects Your Data

Learn what encryption is, how it converts plain text into unreadable ciphertext, and how symmetric and asymmetric encryption protect data in transit and at rest.

View Tutorial

PKI: Public Key Infrastructure

Learn what PKI is, how digital certificates work, and how Certificate Authorities enable secure HTTPS connections and digital signatures.

View Tutorial

Network Security

Firewall: What It Is and How It Works

Learn what a firewall is, how it monitors and filters incoming and outgoing network traffic, and how it protects systems from unauthorized access.

View Tutorial

VPN: Virtual Private Network

Learn what a VPN is, how it encrypts your internet connection, hides your IP address, and provides secure and private browsing over public networks.

View Tutorial

Fundamentals

Web Security: Fundamentals and Best Practices

Learn the fundamentals of web security, common threats, and best practices to protect web applications, users, and data from vulnerabilities and attacks.

View Tutorial

Compliance & Governance

Security Compliance: Standards and Regulations

Learn about security compliance standards like GDPR, HIPAA, PCI-DSS, and SOC 2. Understand requirements for protecting data and avoiding legal penalties.

View Tutorial

Security Assessment

Penetration Testing: How Ethical Hacking Works

Learn what penetration testing is, how ethical hackers simulate cyberattacks, and how testing methods like black box, white box, and gray box identify security vulnerabilities.

View Tutorial