Part 1 Intro
Video Activity
This brief lesson offers participants the agenda for the upcoming module: • Definition, Case Study, Sample Code • Demos: SQL Injection, Command Injection, JSON Injection • Mitigations, countermeasures and defenses • Lab and Lab solution
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Description
This brief lesson offers participants the agenda for the upcoming module: • Definition, Case Study, Sample Code • Demos: SQL Injection, Command Injection, JSON Injection • Mitigations, countermeasures and defenses • Lab and Lab solution
Video Transcription
00:04
Hello and welcome to the side. Berry secure coding course. My name Miss anywhere,
00:10
and this is a loss. Talked him for 2013. A one injection.
00:16
Now our agenda for this module is we're first going to go through some definitions
00:23
and look at some key terms that are used in order to describe an understand injection.
00:30
We're gonna look at a case study
00:32
and also some sample code to see where problems lie inside of application code.
00:39
We're going to have three demos,
00:42
one on sequel injection, another on command injection, and then the last on Jason Ejection.
00:49
Now, because the area of injection attacks is just so broad, I've chosen these three injection attacks to show you in demos to hopefully be able to cover. Ah, large area of interest.
01:06
Finally, we're going to have our mitigations countermeasures in defenses section where we look at what it what we need to do inside of our code in order to address these issues,
01:19
and then we're going to have our lab in the lab solution
Up Next
Instructed By
Similar Content