Chevron Left
Retour à Exploiting and Securing Vulnerabilities in Java Applications

Avis et commentaires pour d'étudiants pour Exploiting and Securing Vulnerabilities in Java Applications par Université de Californie à Davis

4.4
étoiles
57 évaluations

À propos du cours

In this course, we will wear many hats. With our Attacker Hats on, we will exploit Injection issues that allow us to steal data, exploit Cross Site Scripting issues to compromise a users browser, break authentication to gain access to data and functionality reserved for the ‘Admins’, and even exploit vulnerable components to run our code on a remote server and access some secrets. We will also wear Defender Hats. We will dive deep in the code to fix the root cause of these issues and discuss various mitigation strategies. We do this by exploiting WebGoat, an OWASP project designed to teach penetration testing. WebGoat is a deliberately vulnerable application with many flaws and we take aim at fixing some of these issues. Finally we fix these issues in WebGoat and build our patched binaries. Together we will discuss online resources to help us along and find meaningful ways to give back to the larger Application Security community....

Meilleurs avis

MJ

29 nov. 2020

Exploiting and Securing Vulnerabilities in Java Applications is by far the best course in this series. There are practical examples, live coding, and well organized.

GP

22 juin 2020

Excellent and really helpful material... By far the best and most interesting course in the series!

Filtrer par :

1 - 13 sur 13 Avis pour Exploiting and Securing Vulnerabilities in Java Applications

par Janis W

23 févr. 2020

par Lakshay P

3 oct. 2019

par Mahmoud J

30 nov. 2020

par Pratik P

31 mars 2021

par Rommel O

10 oct. 2020

par Shaiful I

13 août 2020

par LUIS A O F

21 févr. 2022

par Giorgos P

23 juin 2020

par Larissa B V

12 janv. 2022

par Gaurav S

26 mai 2020

par Vikram

30 janv. 2020

par Giorgio B

31 oct. 2019

par Heris T

27 oct. 2022