Defensive Coding for C#

Defensive Coding C#    |    Intermediate
  • 15 videos | 1h 2m 42s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 167 users Rating 4.4 of 167 users (167)
To program defensively, you must know what to look for. Explore common risks to C#, how to counter common risks, regular expressions, and the best way to deal with bad data.

WHAT YOU WILL LEARN

  • List potential risks to c# ui applications
    Describe what buffer overflows are and their impact
    Identify how to prevent buffer overflows
    Identify what form injection attacks typically take in c# applications
    Describe how to mitigate injection attacks in c# applications
    Identify how to prevent shatter attacks in .net applications
    Recognize how to prevent dll highjacking in .net applications
    Use exceptions in c# applications
  • Specify how to deal with bad data in your c# applications
    How to use input validation in a c# application
    How to use regular express to help in input validation
    Recognize how to constrain user input to prevent bad data input
    Describe what sql injection attacks are
    Recognize how to use stored procdures to aid in the defense of sql injection attacks
    Describe some of the pitfalls of using dynamic sql

IN THIS COURSE

  • 3m 1s
    Upon completion of this video, you will be able to list potential risks to C# UI applications. FREE ACCESS
  • 2m 58s
    After completing this video, you will be able to describe what buffer overflows are and their impact on systems. FREE ACCESS
  • Locked
    3.  Preventing Buffer Overflows
    3m 53s
    In this video, you will learn how to prevent buffer overflows. FREE ACCESS
  • Locked
    4.  Injection Attacks in C# Applications
    5m 20s
    Learn how to identify what form injection attacks typically take in C# applications. FREE ACCESS
  • Locked
    5.  Mitigating Injection Attacks
    3m 36s
    After completing this video, you will be able to describe how to mitigate injection attacks in C# applications. FREE ACCESS
  • Locked
    6.  Windows Shatter Attacks
    3m 10s
    In this video, you will learn how to prevent shatter attacks in .NET applications. FREE ACCESS
  • Locked
    7.  Preventing DLL Highjacking in .NET Applications
    4m 41s
    Upon completion of this video, you will be able to recognize how to prevent DLL highjacking in .NET applications. FREE ACCESS
  • Locked
    8.  Using Exceptions in C# Applications
    4m 42s
    In this video, you will learn how to use exceptions in C# applications. FREE ACCESS
  • Locked
    9.  Dealing with Bad Data
    4m 51s
    Upon completion of this video, you will be able to specify how to deal with bad data in your C# applications. FREE ACCESS
  • Locked
    10.  Validating Input
    4m 49s
    Find out how to use input validation in a C# application. FREE ACCESS
  • Locked
    11.  Using Regular Expressions
    4m 4s
    Find out how to use regular expressions to help in input validation. FREE ACCESS
  • Locked
    12.  Constraining User Input
    5m 14s
    After completing this video, you will be able to recognize how to constrain user input to prevent bad data input. FREE ACCESS
  • Locked
    13.  SQL Injection Attacks
    3m 39s
    After completing this video, you will be able to describe what SQL injection attacks are and how to prevent them. FREE ACCESS
  • Locked
    14.  Stored Procedures
    4m 13s
    After completing this video, you will be able to recognize how to use Stored Procedures to aid in the defense of SQL injection attacks. FREE ACCESS
  • Locked
    15.  Dynamic SQL
    4m 31s
    Upon completion of this video, you will be able to describe some of the pitfalls of using dynamic SQL. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Journey C# Journey
Rating 4.7 of 3 users Rating 4.7 of 3 users (3)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 33 users Rating 4.3 of 33 users (33)
Rating 4.7 of 68 users Rating 4.7 of 68 users (68)
Rating 4.5 of 175 users Rating 4.5 of 175 users (175)