Security Mindset
Handling Sensitive Data
Authentication & Authorization
Session Management
JWT
Spring Security
Practice
Assignment
Back end Track
Under construction
<aside>
🚧
This page is currently under construction. Please check back later.
</aside>
Implementation plan:
- Why security matters — consequences of breaches
- Thinking like an attacker — what can go wrong
- Threat modeling basics: identify assets, threats, and mitigations
- Common backend vulnerabilities (high-level)
- Injection attacks
- Broken authentication
- Sensitive data exposure
- Broken access control
- The principle of least privilege
- Defense in depth — multiple layers of security
- OWASP Top 10 overview (awareness)
The HackYourFuture curriculum is licensed under CC BY-NC-SA 4.0

*https://hackyourfuture.net/*
Found a mistake or have a suggestion? Let us know in the feedback form.