Part 1 Intro

Video Activity

This brief lesson introduces the course agenda. This module covers: • Definition, sample code, case study • Demo: JavaScript Validation Bypass • Mitigations, countermeasures and defenses • Lab and Lab Solution: WebGoat – HTTP response splitting

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
9 hours 31 minutes
Difficulty
Intermediate
Video Description

This brief lesson introduces the course agenda. This module covers: • Definition, sample code, case study • Demo: JavaScript Validation Bypass • Mitigations, countermeasures and defenses • Lab and Lab Solution: WebGoat – HTTP response splitting

Video Transcription
00:04
Hello and welcome to the side. Very secure coding course.
00:08
My name is Sonny Wear and this is San's top 25 category porous defenses. Now our agenda for this particular category
00:19
is we will look at an overall definition for porous defenses.
00:24
We will also look at sample code for all of the remaining issues that are in this category.
00:31
We will also talk about a case study involving
00:36
the example of how porous defenses are in use.
00:41
Our demo is going to be of Java script validation bypassing.
00:48
Then we'll roll into are mitigations countermeasures in defenses and finally will wrap up the module with our lab. We're gonna use Web goats. Http. Response splitting exercise
01:00
for our lab.
Up Next