Time
9 hours 31 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Description

This brief lesson offers the course agenda. This module will cover: • Definition, sample code, case study • Demos: sensitive information in HTML/Javascript comments, hidden or secret URLs, HTML5 Web Storage Manipulation • Mitigations, countermeasures and defenses • Lab and Lab Solution

Video Transcription

00:04
Hello and welcome to the side. I bury secure coding course my name Miss anywhere. And this is AWAS top 10 for 2013. A six sensitive data exposure.
00:17
Now for our agenda, we will, of course, look at our definition for sensitive data exposure. We're also going to take a look at various code samples or ways in which data can be exposed unintentionally.
00:36
And then finally, we're gonna have a case study to wrap up our explanation portion.
00:43
We're gonna follow that up with three demos. The first demo is going to be information that is disclosed through HTML or Java script comments.
00:57
The second demo is going to be
01:00
how we can expose hidden or secret. You are Els.
01:03
And then finally, the last is going to be a demonstration of HTML five Web storage manipulation.
01:14
Then we'll go into our defense is countermeasures in mitigation section, and then we'll wrap up with our lab in the lab solution

Up Next

Secure Coding

In the Secure Coding training course, Sunny Wear will show you how secure coding is important when it comes to lowering risk and vulnerabilities. Learn about XSS, Direct Object Reference, Data Exposure, Buffer Overflows, & Resource Management.

Instructed By

Instructor Profile Image
Sunny Wear
Instructor