Time
9 hours 31 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Description

This brief lesson offers the course agenda. This module will cover: Definition, sample code, case study Demo: Path Traversal with local file inclusion Mitigations, countermeasures, defenses

Video Transcription

00:04
Hello and welcome to the cyber very secure coding course.
00:08
My name is anywhere, and this is the Sands Top 25 category.
00:14
Risky resource management. Now our agenda for this module is we're going to look at a definition for the overall category. We will also go into some explanations for the issues that remain in this category.
00:31
We're going to take a look at some sample code, some sample attacks
00:36
and, of course, our case study.
00:39
Following that, we will have a demo
00:42
that's going to show a path traverse along with a local file inclusion attack.
00:49
Then we'll look at our mitigations, countermeasures and defenses.
00:53
And then we'll wrap up the module with
00:57
a lab from Web goat using the denial of service via multiple Loggins exercise or what I'm calling the denial of service via resource exhaustion exercise.

Up Next

Secure Coding

In the Secure Coding training course, Sunny Wear will show you how secure coding is important when it comes to lowering risk and vulnerabilities. Learn about XSS, Direct Object Reference, Data Exposure, Buffer Overflows, & Resource Management.

Instructed By

Instructor Profile Image
Sunny Wear
Instructor