Time
9 hours 31 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Description

This brief lesson offers participants the agenda for the upcoming module: • Definition, Case Study, Sample Code • Demos: SQL Injection, Command Injection, JSON Injection • Mitigations, countermeasures and defenses • Lab and Lab solution

Video Transcription

00:04
Hello and welcome to the side. Berry secure coding course. My name Miss anywhere,
00:10
and this is a loss. Talked him for 2013. A one injection.
00:16
Now our agenda for this module is we're first going to go through some definitions
00:23
and look at some key terms that are used in order to describe an understand injection.
00:30
We're gonna look at a case study
00:32
and also some sample code to see where problems lie inside of application code.
00:39
We're going to have three demos,
00:42
one on sequel injection, another on command injection, and then the last on Jason Ejection.
00:49
Now, because the area of injection attacks is just so broad, I've chosen these three injection attacks to show you in demos to hopefully be able to cover. Ah, large area of interest.
01:06
Finally, we're going to have our mitigations countermeasures in defenses section where we look at what it what we need to do inside of our code in order to address these issues,
01:19
and then we're going to have our lab in the lab solution

Up Next

Secure Coding

In the Secure Coding training course, Sunny Wear will show you how secure coding is important when it comes to lowering risk and vulnerabilities. Learn about XSS, Direct Object Reference, Data Exposure, Buffer Overflows, & Resource Management.

Instructed By

Instructor Profile Image
Sunny Wear
Instructor