Part 1 Intro

Video Activity

This brief lesson introduces the agenda of the module; which will cover the following: • Definition: sample code, case study • Demo: unrestricted file upload • Mitigations, countermeasures and defenses • Lab and Lab Solution: Web Goat- Malicious File Upload and Execution.

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
9 hours 31 minutes
Difficulty
Intermediate
Video Description

This brief lesson introduces the agenda of the module; which will cover the following: • Definition: sample code, case study • Demo: unrestricted file upload • Mitigations, countermeasures and defenses • Lab and Lab Solution: Web Goat- Malicious File Upload and Execution.

Video Transcription
00:04
Hello and welcome to the side. Very secure coding course.
00:08
My name is anywhere and this is Sam. Stopped 25.
00:13
This category is called insecure interaction between components. Now, for our agenda for this module,
00:22
we're going to take a look at the definition of both the category as well as Theis issues that are remaining that we need to cover.
00:32
We will look at some sample code. And, of course, we will discuss a case study
00:38
following that will have a demo of the remaining issue,
00:44
which is unrestricted file upload with dangerous types.
00:50
Then we'll go into are mitigations countermeasures in defenses.
00:54
And then, of course, will wrap up our module with our lab in the lab solution. We're gonna use Web goats, malicious file, upload an execution lesson.
Up Next