Defensive Coding, APIs, and Security

JavaScript    |    Intermediate
  • 13 videos | 39m 54s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 48 users Rating 4.7 of 48 users (48)
Learn how to use JavaScript defensive techniques to prevent issues like DOM manipulation. In addition, learn about third-party risks, client trust issues, sandbox implementation, SVG exploits, and JSON risks.

WHAT YOU WILL LEARN

  • Demonstrate how to prevent dom manipulation in javascript
    Describe common risks associated with third-party apis
    Demonstrate how to prevent page manipulation in javascript through css
    Identify the best practices for dealing with client input in a javascript html5 application
    Troubleshoot potential risks associated with browser plugins
    Demonstrate how to counteract risks by running javascript in a sandbox
    Compare svg exploits and how to use javascript to prevent them
  • Describe how to secure javascript code in your applications
    Describe the key features of javascript object notation
    List the key risk of using javascript object notation
    Perform input validation on json data
    Use the eval method to convert json data into a javascript object
    Use defensive coding techniques to create a secure javascript and html5 application

IN THIS COURSE

  • 2m 24s
    In this video, you will learn how to prevent DOM manipulation in JavaScript. FREE ACCESS
  • 3m 42s
    After completing this video, you will be able to describe common risks associated with using third-party APIs. FREE ACCESS
  • Locked
    3.  JavaScript and CSS
    2m 39s
    In this video, you will learn how to prevent page manipulation in JavaScript through the use of CSS. FREE ACCESS
  • Locked
    4.  Client Trust Issues and JavaScript
    3m 31s
    In this video, learn how to identify the best practices for dealing with client input in a JavaScript HTML5 application. FREE ACCESS
  • Locked
    5.  Browser and Plugin Issues
    3m 38s
    During this video, you will learn how to troubleshoot potential risks associated with browser plugins. FREE ACCESS
  • Locked
    6.  Sandbox Implementation Risks
    3m 14s
    In this video, you will learn how to reduce risks by running JavaScript in a sandbox. FREE ACCESS
  • Locked
    7.  SVG Exploits and JavaScript
    2m 22s
    In this video, you will compare SVG exploits and how to use JavaScript to prevent them. FREE ACCESS
  • Locked
    8.  Securing JavaScript Code
    2m 35s
    Upon completion of this video, you will be able to describe how to secure JavaScript code in your applications. FREE ACCESS
  • Locked
    9.  Introduction to JSON
    2m 30s
    Upon completion of this video, you will be able to describe the key features of JavaScript Object Notation. FREE ACCESS
  • Locked
    10.  JSON Risks
    2m 35s
    Upon completion of this video, you will be able to list the key risks of using JavaScript Object Notation. FREE ACCESS
  • Locked
    11.  JSON Input Validation
    3m 7s
    In this video, you will learn how to validate input on JSON data. FREE ACCESS
  • Locked
    12.  JSON Data and Eval
    2m 38s
    Learn how to use the eval() method to convert JSON data into a JavaScript object. FREE ACCESS
  • Locked
    13.  Exercise: Securing JavaScript and HTML5
    5m
    In this video, you will learn how to use defensive coding techniques to create a secure JavaScript and HTML5 Application. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.5 of 255 users Rating 4.5 of 255 users (255)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.0 of 2 users Rating 4.0 of 2 users (2)
Rating 4.5 of 6 users Rating 4.5 of 6 users (6)
Rating 4.6 of 33 users Rating 4.6 of 33 users (33)