Secure Programmer: Vulnerabilities
Intermediate
- 19 videos | 1h 11m 37s
- Includes Assessment
- Earns a Badge
Explore various software vulnerability topics in this 19-video, which opens with a look at specific security vulnerabilities and how to program counter techniques. Then learners receive three tutorials on the OWASP (Open Web Application Security Project) Top 10 vulnerabilities: SQL injection, broken authentication, and cross-site scripting; broken access control, security misconfiguration, sensitive data exposure, and insufficient attack protection; and cross-site request forgery, using components with known vulnerabilities, and under protected application programming interfaces (APIs). Examine use of threat models including STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation), PASTA (the Process for Attack Simulation and Threat Analysis), DREAD (Damage, Reproductibility, Exploitability, Affected Users, Discoverability), and SQUARE (Security Quality Requirements Engineering). Use CVE (common vulnerabilities and exposures) vulnerability scoring, and examine Java, Python, C#, and Javascript SQL secure coding examples. Implement Python secure coding to combat SQL vulnerability; C# to combat common code vulnerabilities, and Javascript to combat Cross Site Scripting attacks. Use Common Vulnerability Scoring System (CVSS), and finally, use OWASP Zap and Vega vulnerability scanners to test websites for common vulnerabilities.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe specific security vulnerabilities and recognize how to program counter techniquesDescribe owasp top 10 vulnerabilities including sql injection, broken authentication, and cross-site scriptingDescribe owasp top 10 vulnerabilities including broken access control, security misconfiguration, sensitive data exposure, and insufficient attack protectionDescribe owasp top 10 vulnerabilities including cross-site request forgery, using components with known vulnerabilities, and underprotected apisDescribe and use threat models including stride, pasta, dread, and squareDescribe and use cve vulnerability scoringImplement java secure coding to combat rhino script vulnerabilityImplement python secure coding to combat remote code execution vulnerabilityImplement c# secure coding to combat sql injection vulnerability
-
Implement javascript secure coding to combat sql injection vulnerabilityImplement java secure coding to combat sql injection vulnerabilityImplement python secure coding to combat a variety of security vulnerabilitiesImplement c# secure coding to combat common code vulnerabilitiesImplement javascript secure coding to combat cross site scripting attacksUse cvss scoring for vulnerabilitiesUse owasp zap vulnerability scanner to test web sites for common vulnerabilitiesUse vega vulnerability scanner to test web sites for common vulnerabilitiesSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 25s
-
3m 56sAfter completing this video, you will be able to describe specific security vulnerabilities and recognize how to program countermeasures. FREE ACCESS
-
3m 40sUpon completion of this video, you will be able to describe OWASP Top 10 vulnerabilities, including SQL injection, broken authentication, and cross-site scripting. FREE ACCESS
-
7m 5sUpon completion of this video, you will be able to describe the OWASP Top 10 vulnerabilities, including broken access control, security misconfiguration, sensitive data exposure, and insufficient attack protection. FREE ACCESS
-
3m 57sAfter completing this video, you will be able to describe OWASP Top 10 vulnerabilities including cross-site request forgery, using components with known vulnerabilities, and underprotected APIs. FREE ACCESS
-
5m 20sAfter completing this video, you will be able to describe and use threat models including STRIDE, PASTA, DREAD, and SQUARE. FREE ACCESS
-
1m 59sUpon completion of this video, you will be able to describe and use the CVE vulnerability scoring system. FREE ACCESS
-
3m 49sFind out how to implement Java secure coding to combat the Rhino Script vulnerability. FREE ACCESS
-
3m 38sFind out how to implement Python secure coding to combat Remote Code Execution Vulnerability. FREE ACCESS
-
3m 27sIn this video, learn how to implement C# secure coding to prevent SQL Injection Vulnerability. FREE ACCESS
-
4m 1sIn this video, find out how to implement secure coding in JavaScript to combat SQL Injection Vulnerability. FREE ACCESS
-
3mFind out how to implement Java secure coding to combat SQL Injection Vulnerability. FREE ACCESS
-
3m 55sIn this video, you will learn how to use Python secure coding to combat a variety of security vulnerabilities. FREE ACCESS
-
3m 39sFind out how to implement C# secure coding to prevent common code vulnerabilities. FREE ACCESS
-
3m 39sFind out how to implement secure JavaScript coding to combat Cross Site Scripting attacks. FREE ACCESS
-
4m 53sIn this video, you will learn how to use CVSS scoring for vulnerabilities. FREE ACCESS
-
4m 26sIn this video, find out how to use the OWASP Zap vulnerability scanner to test web sites for common vulnerabilities. FREE ACCESS
-
4m 16sFind out how to use Vega Vulnerability Scanner to test websites for common vulnerabilities. FREE ACCESS
-
1m 32s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.