Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. CMD+CTRL Security
  4. Defending Go Applications Against CSRF

Defending Go Applications Against CSRF

Cross-site request Forgery (CSRF) vulnerabilities occur when a web application performs sensitive actions without validating that the request originated from within the application. Attackers exploit this vulnerability to manipulate legitimate users into executing malicious actions unknowingly. In this lab, learners gain hands-on experience identifying and mitigating CSRF vulnerabilities in Go applications. The recommended mitigation strategy involves implementing Anti-CSRF tokens to validate requests performing sensitive or dangerous functionality. The virtual environment provides a vulnerable application and complete source code to train developers effectively.

Course Overview

Overall Proficiency Level
3 - Advanced
Course Catalog Number
LAB 338
Training Purpose
Skill Development
Specific Audience
All
Delivery Method
Online, Self-Paced
  • Online, Self-Paced

Learning Objectives

After completing this Skill lab, the learner will understand how to defend Go applications against CSRF vulnerabilities and implement appropriate mitigation strategies.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: