Programming Foundations: Web Security

  • 1
  • 2-3 hours worth of material
  • LinkedIn Learning
  • English
Programming Foundations: Web Security

Course Overview

Learn about the most important security concerns when developing websites, and what you can do to keep your servers, software, and data safe from harm.

Course Circullum

Introduction
  • The importance of security
1. Security Overview
  • What is security?
  • Why security matters
  • What is a hacker?
  • Threat models
  • Total security is unachievable
2. General Security Principles
  • Least privilege
  • Simple is more secure
  • Never trust users
  • Expect the unexpected
  • Defense in depth
  • Security through obscurity
  • Deny lists and allow lists
  • Map exposure points and data passageways
3. Filter Input, Control Output
  • Regulate requests
  • Validate input
  • Sanitize data
  • Label variables
  • Keep code private
  • Keep credentials private
  • Keep error messages vague
  • Smart logging
4. The Most Common Attacks
  • Types of credential attacks
  • Strong passwords
  • URL manipulation and insecure direct object reference (IDOR)
  • SQL injection
  • Cross-site scripting (XSS)
  • Cross-site request forgery (CSRF)
  • Cross-site request protections
  • Cookie visibility and theft
  • Session hijacking
  • Session fixation
  • Remote code execution
  • File upload abuse
  • Denial of service
Conclusion
  • Next steps
out of 5.0
5 Star 85%
4 Star 75%
3 Star 53%
1 Star 20%

Item Reviews - 3

Submit Reviews

Free Trial Available

This Course Include:
Introduction
  • The importance of security
1. Security Overview
  • What is security?
  • Why security matters
  • What is a hacker?
  • Threat models
  • Total security is unachievable
2. General Security Principles
  • Least privilege
  • Simple is more secure
  • Never trust users
  • Expect the unexpected
  • Defense in depth
  • Security through obscurity
  • Deny lists and allow lists
  • Map exposure points and data passageways
3. Filter Input, Control Output
  • Regulate requests
  • Validate input
  • Sanitize data
  • Label variables
  • Keep code private
  • Keep credentials private
  • Keep error messages vague
  • Smart logging
4. The Most Common Attacks
  • Types of credential attacks
  • Strong passwords
  • URL manipulation and insecure direct object reference (IDOR)
  • SQL injection
  • Cross-site scripting (XSS)
  • Cross-site request forgery (CSRF)
  • Cross-site request protections
  • Cookie visibility and theft
  • Session hijacking
  • Session fixation
  • Remote code execution
  • File upload abuse
  • Denial of service
Conclusion
  • Next steps
  • Provider:LinkedIn Learning
  • Certificate:Certificate Available
  • Language:English
  • Duration:2-3 hours worth of material
  • Language CC:

Do You Have Questions ?

We'll help you to grow your career and growth.
Contact Us Today