Part 1 Intro
Video Activity
This brief lesson introduces the course agenda. This module covers: • Definition, sample code, case study • Demo: JavaScript Validation Bypass • Mitigations, countermeasures and defenses • Lab and Lab Solution: WebGoat – HTTP response splitting
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Description
This brief lesson introduces the course agenda. This module covers: • Definition, sample code, case study • Demo: JavaScript Validation Bypass • Mitigations, countermeasures and defenses • Lab and Lab Solution: WebGoat – HTTP response splitting
Video Transcription
00:04
Hello and welcome to the side. Very secure coding course.
00:08
My name is Sonny Wear and this is San's top 25 category porous defenses. Now our agenda for this particular category
00:19
is we will look at an overall definition for porous defenses.
00:24
We will also look at sample code for all of the remaining issues that are in this category.
00:31
We will also talk about a case study involving
00:36
the example of how porous defenses are in use.
00:41
Our demo is going to be of Java script validation bypassing.
00:48
Then we'll roll into are mitigations countermeasures in defenses and finally will wrap up the module with our lab. We're gonna use Web goats. Http. Response splitting exercise
01:00
for our lab.
Up Next
Instructed By
Similar Content