Authorization fundamentals
Detailed examination of the authorization process
Types of permission systems and where they’re applied
Implementing authorization and best practices
Attacks against authorization
Session management fundamentals
Attacks against session management
Session management best practices