Chevron Left
Retour à Identifying Security Vulnerabilities

Avis et commentaires pour l'étudiant pour Identifying Security Vulnerabilities par Université de Californie à Davis

4.1
8 notes
4 avis

À propos du cours

This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. We'll learn the basics of applying cryptography, such as encryption and secure hashing. We'll learn how attackers can exploit application vulnerabilities through the improper handling user-controlled data. We'll gain a fundamental understanding of injection problems in web applications, including the three most common types of injection problems: SQL injection, cross-site scripting, and command injection. We'll also cover application authentication and session management where authentication is a major component of a secure web application and session management is the other side of the same coin, since the authenticated state of user requests need to be properly handled and run as one session. We'll learn about sensitive data exposure issues and how you can help protect your customer's data. We'll cover how to effectively store password-related information, and not to store the actual plaintext passwords. We'll participate in coding assignment that will help you to better understand the mechanisms for effectively storing password-related information. Along the way, we’ll discuss ways of watching out for and mitigating these issues and be able have some fun and exploit two different vulnerabilities in a web application that was designed to be vulnerable, called WebGoat....

Meilleurs avis

SJ

Oct 23, 2019

Threat Modeling and Week 4 code submission was very fruitful. Overall good content to learn for developers and Application Engineers.

SM

Jul 17, 2019

I can now take full control of my personal information online, without any tradeoffs

Filtrer par :

1 - 4 sur 4 Examens pour Identifying Security Vulnerabilities

par Shimane M

Jul 17, 2019

I can now take full control of my personal information online, without any tradeoffs

par Sanjeev J

Oct 23, 2019

Threat Modeling and Week 4 code submission was very fruitful. Overall good content to learn for developers and Application Engineers.

par Giorgio B

Oct 30, 2019

Except for the first week, which introduces thread models, the rest of the course is the same as a part on "Identifying vulnerabilities in C/C++ programming"....

par malromaithi

Nov 12, 2019

A lot of the labs need to be updated as the latest webgoat does not function the same way as described in the lab anymore.