Part 1 Intro
Video Activity
This brief lesson offers the course agenda. This module will cover: Definition, sample code, case study Demo: Path Traversal with local file inclusion Mitigations, countermeasures, defenses
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Description
This brief lesson offers the course agenda. This module will cover: Definition, sample code, case study Demo: Path Traversal with local file inclusion Mitigations, countermeasures, defenses
Video Transcription
00:04
Hello and welcome to the cyber very secure coding course.
00:08
My name is anywhere, and this is the Sands Top 25 category.
00:14
Risky resource management. Now our agenda for this module is we're going to look at a definition for the overall category. We will also go into some explanations for the issues that remain in this category.
00:31
We're going to take a look at some sample code, some sample attacks
00:36
and, of course, our case study.
00:39
Following that, we will have a demo
00:42
that's going to show a path traverse along with a local file inclusion attack.
00:49
Then we'll look at our mitigations, countermeasures and defenses.
00:53
And then we'll wrap up the module with
00:57
a lab from Web goat using the denial of service via multiple Loggins exercise or what I'm calling the denial of service via resource exhaustion exercise.
Up Next
Instructed By
Similar Content