À propos de ce cours

100 % en ligne

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.

Niveau intermédiaire

1-2 years of experience with some form of computer programming language like C/C++ or Java.

Approx. 12 heures pour terminer

Recommandé : 4 weeks of study, 2-5 hours/week...

Anglais

Sous-titres : Anglais

Compétences que vous acquerrez

CryptographyAuthentication Methodssecure programming

100 % en ligne

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.

Niveau intermédiaire

1-2 years of experience with some form of computer programming language like C/C++ or Java.

Approx. 12 heures pour terminer

Recommandé : 4 weeks of study, 2-5 hours/week...

Anglais

Sous-titres : Anglais

Programme du cours : ce que vous apprendrez dans ce cours

Semaine
1
5 heures pour terminer

Foundational Topics in Secure Programming

In this module, you will gain exposure to the ideas of threat modeling and applied cryptography. By the end of the module, you will be able to start to create threat models, and think critically about the threat models created by other people. You will be able to apply the STRIDE Method to your threat model and distinguish the trust boundaries in a given system. You will also gain a basic understanding of applied cryptography, such as encryption and secure hashing.

...
14 vidéos (Total 83 min), 3 lectures, 2 quiz
14 vidéos
The STRIDE Method Via Example9 min
STRIDE Threats In More Detail Via Example4 min
Trust Boundaries2 min
Cryptography Basics Introduction3 min
Cryptography Basics: Block Ciphers9 min
Cryptography Basics: Symmetric and Asymmetric Cryptography5 min
Cryptography Basics: Hash Functions9 min
Cryptography Basics: Application to Threat Models4 min
Lab: Threat Model Activity3 min
OWASP Top 10 Proactive Controls and Exploits - Part 16 min
OWASP Top 10 Proactive Controls and Exploits - Part 29 min
3 lectures
A Note From UC Davis10 min
Welcome to Peer Review Assignments!10 min
Reading and Resource20 min
1 exercice pour s'entraîner
Module 1 Quiz30 min
Semaine
2
3 heures pour terminer

Injection Problems

By the end of this module, you will have a fundamental understanding of injection problems in web applications. You'll be able to discuss and describe the three most common types of injection problems: SQL injection, cross-site scripting, and command injection. In order to drive home these concepts, you will be able to work on exploiting a SQL injection vulnerability in the WebGoat application. You'll be able to formulate plans to mitigate injection problems in your applications.

...
17 vidéos (Total 87 min), 1 lecture, 1 quiz
17 vidéos
Mitigating SQL Injection Using Prepared Statements3 min
Mitigating SQL Injection Using Stored Procedures3 min
Mitigating SQL Injection Using Whitelisting2 min
Injection Problems in Real Life5 min
Solution Screencast for Lab: Exploit Using WebGoat's SQLi Example7 min
Cross-Site Scripting Introduction3 min
HTTP and Document Isolation8 min
DOM, Dynamically Generating Pages, and Cross-Site Scripting7 min
The 3-Kinds of Cross-Site Scripting Vulnerabilities6 min
Comparing and Contrasting Cross-Site Scripting Vulnerabilities3 min
OWASP Prescribed Cross-site Scripting Prevention Rules - Part 16 min
OWASP Prescribed Cross-site Scripting Prevention Rules - Part 26 min
Command Injection Problems3 min
OWASP Proactive Controls Related to Injections4 min
1 lecture
Resources20 min
1 exercice pour s'entraîner
Module 2 Quiz30 min
Semaine
3
4 heures pour terminer

Problems Arising From Broken Authentication

By the end of this module, you will be able to evaluate a system to determine if it follows the generally prescribed secure methods for authentication and session management in web applications. You'll be able to distinguish the relationship between authentication, session management, and access control. You will also be able to exploit WebGoat's authentication and session management vulnerability. As well as be able to evaluate a system to determine if it performs sufficient security logging such that non-repudiation is enforced. This will help drive the concepts that you will learn in this module.

...
11 vidéos (Total 71 min), 1 lecture, 1 quiz
11 vidéos
Handling Error Messages During Authentication4 min
Introduction to Session Management7 min
Enforcing Access Control with Session Management7 min
Session Management Threat: Bruteforce Session IDs10 min
Session Management Theat: Session Fixation Vulnerabilities3 min
Logging and Monitoring3 min
Solution for Lab #3: WebGoat’s Session Management Vulnerability9 min
OWASP Proactive Controls Related to Session Management and Authentication6 min
1 lecture
Resources20 min
1 exercice pour s'entraîner
Module 3 Quiz30 min
Semaine
4
4 heures pour terminer

Sensitive Data Exposure Problems

By the end of this module, you will understand how to effectively store password-related information, and NOT to store the actual plaintext passwords. You will also have a hands on coding assignment that will help you to better understand the mechanisms for effectively storing password-related information. Ready?

...
9 vidéos (Total 36 min), 1 lecture, 2 quiz
9 vidéos
Issue 2: Not Encrypting Sensitive Information2 min
Issue 3: Improperly Storing Passwords5 min
Slowing Down Password Bruteforce Attacks7 min
Issue 4: Using HTTP for Sensitive Client-server4 min
OWASP Proactive Controls Related to Sensitive Data Exposure3 min
Course Summary1 min
1 lecture
Resources20 min
1 exercice pour s'entraîner
Module 4 Quiz30 min

Enseignant

Avatar

Sandra Escandor-O'Keefe

Offensive Security Engineer at Fastly
Continuing and Professional Education

À propos de Université de Californie à Davis

UC Davis, one of the nation’s top-ranked research universities, is a global leader in agriculture, veterinary medicine, sustainability, environmental and biological sciences, and technology. With four colleges and six professional schools, UC Davis and its students and alumni are known for their academic excellence, meaningful public service and profound international impact....

Foire Aux Questions

  • Une fois que vous êtes inscrit(e) pour un Certificat, vous pouvez accéder à toutes les vidéos de cours, et à tous les quiz et exercices de programmation (le cas échéant). Vous pouvez soumettre des devoirs à examiner par vos pairs et en examiner vous-même uniquement après le début de votre session. Si vous préférez explorer le cours sans l'acheter, vous ne serez peut-être pas en mesure d'accéder à certains devoirs.

D'autres questions ? Visitez le Centre d'Aide pour les Etudiants.