1. Injection
2. Core Knowledge
3. Security Mindset
4. Client Side and Server Side
5. Authentication and Access Control
6. Cryptography
7. Cross Site Request Forgery
8. Deployment
9. External Packages
10. Monitoring and Response
11. Conclusion
Download Link