Part 1 Intro

Video Activity

This brief lesson offers the course agenda. This module will cover: Definition, sample code, case study Demo: Path Traversal with local file inclusion Mitigations, countermeasures, defenses

Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
9 hours 31 minutes
Difficulty
Intermediate
CEU/CPE
10
Video Description

This brief lesson offers the course agenda. This module will cover: Definition, sample code, case study Demo: Path Traversal with local file inclusion Mitigations, countermeasures, defenses

Video Transcription
00:04
Hello and welcome to the cyber very secure coding course.
00:08
My name is anywhere, and this is the Sands Top 25 category.
00:14
Risky resource management. Now our agenda for this module is we're going to look at a definition for the overall category. We will also go into some explanations for the issues that remain in this category.
00:31
We're going to take a look at some sample code, some sample attacks
00:36
and, of course, our case study.
00:39
Following that, we will have a demo
00:42
that's going to show a path traverse along with a local file inclusion attack.
00:49
Then we'll look at our mitigations, countermeasures and defenses.
00:53
And then we'll wrap up the module with
00:57
a lab from Web goat using the denial of service via multiple Loggins exercise or what I'm calling the denial of service via resource exhaustion exercise.
Up Next