Secure Full Stack Developer Programming

Full Stack    |    Intermediate
  • 14 videos | 1h 14m 37s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 65 users Rating 4.4 of 65 users (65)
Explore essential best practices and concepts for secure Full Stack Development (FSD) programming in this 14-video course. Discover how to protect various layers in the FSD stack by configuring SSL (secure sockets layer), preventing and defending against attacks, analyzing logs, and cookie prefixing. Key concepts covered here include how secure programming applies to full stack developers; how to configure web servers to use SSL; and how to prevent cross-site forgery attacks. Next, learn to analyze logs with the ELK Stack; learn OWASP's top 10 security risks; learn how to configure HSTS on web servers; and learn how to prevent cross-site scripting attacks, when an attacker injects malicious client site code, most often Javascript, into a web application. Learn how to defend against click-jacking attacks, when an attacker wants the user to click something the user does not want to click; learn to prevent XSS attacks using CSP; and learn to prevent caching of sensitive data. Finally, learn how to identify cookie prefixing methods, and to prevent CSRF attacks by using the SameSite cookie attribute.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify how secure programming applies to full stack developers
    Configure your web server to use ssl
    Prevent cross-site forgery attacks
    Analyze logs using the elk stack
    Identify owasp's top 10 security risks
    Configure hsts on web servers
  • Prevent cross-site scripting attacks
    Defend against clickjacking attacks
    Prevent xss attacks using csp
    Prevent caching of sensitive data
    Identify cookie prefixing methods
    Prevent csrf attacks using the same-site cookie attribute
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 43s
  • 6m 21s
    In this video, you will learn how secure programming applies to Full Stack Developers. FREE ACCESS
  • Locked
    3.  SSL Configuration
    7m 45s
    In this video, you will learn how to configure your web server to use SSL. FREE ACCESS
  • Locked
    4.  Cross-Site Forgery Attack Prevention
    6m 6s
    In this video, find out how to prevent cross-site forgery attacks. FREE ACCESS
  • Locked
    5.  Analyze Logs Using the ELK Stack
    5m 12s
    In this video, you will analyze logs using the ELK stack. FREE ACCESS
  • Locked
    6.  OWASP's Top 10 Security Risks
    8m 59s
    In this video, you will identify the top 10 security risks from OWASP. FREE ACCESS
  • Locked
    7.  Implement HTTP Strict Transport Protocol
    5m 19s
    Learn how to configure HSTS on web servers. FREE ACCESS
  • Locked
    8.  Prevent Cross-Site Scripting Attacks
    5m 5s
    Learn how to prevent cross-site scripting attacks. FREE ACCESS
  • Locked
    9.  Defend Against Clickjacking Attacks
    4m 38s
    Learn how to defend against clickjacking attacks. FREE ACCESS
  • Locked
    10.  Implement Content Security Policy
    5m 45s
    In this video, find out how to prevent XSS attacks by using CSP. FREE ACCESS
  • Locked
    11.  Prevent Caching of Sensitive Data
    5m 1s
    Learn how to prevent sensitive data from being cached. FREE ACCESS
  • Locked
    12.  Cookie Prefixing
    5m 45s
    Find out how to identify cookie prefixing methods. FREE ACCESS
  • Locked
    13.  Prevent Cross-Site Request Forgery Attacks
    5m 57s
    During this video, you will learn how to prevent CSRF attacks by using the Same-Site cookie attribute. FREE ACCESS
  • Locked
    14.  Course Summary
    1m

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 322 users Rating 4.5 of 322 users (322)
Rating 4.7 of 212 users Rating 4.7 of 212 users (212)
Rating 4.6 of 9 users Rating 4.6 of 9 users (9)