Part 1 Intro
Video Activity
This brief lesson introduces the agenda of the module; which will cover the following: • Definition: sample code, case study • Demo: unrestricted file upload • Mitigations, countermeasures and defenses • Lab and Lab Solution: Web Goat- Malicious File Upload and Execution.
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Description
This brief lesson introduces the agenda of the module; which will cover the following: • Definition: sample code, case study • Demo: unrestricted file upload • Mitigations, countermeasures and defenses • Lab and Lab Solution: Web Goat- Malicious File Upload and Execution.
Video Transcription
00:04
Hello and welcome to the side. Very secure coding course.
00:08
My name is anywhere and this is Sam. Stopped 25.
00:13
This category is called insecure interaction between components. Now, for our agenda for this module,
00:22
we're going to take a look at the definition of both the category as well as Theis issues that are remaining that we need to cover.
00:32
We will look at some sample code. And, of course, we will discuss a case study
00:38
following that will have a demo of the remaining issue,
00:44
which is unrestricted file upload with dangerous types.
00:50
Then we'll go into are mitigations countermeasures in defenses.
00:54
And then, of course, will wrap up our module with our lab in the lab solution. We're gonna use Web goats, malicious file, upload an execution lesson.
Up Next
Instructed By
Similar Content