Part 1 Intro

Video Activity

This brief lesson offers the course agenda. This module will cover: • Definition, sample code, case study • Demos: sensitive information in HTML/Javascript comments, hidden or secret URLs, HTML5 Web Storage Manipulation • Mitigations, countermeasures and defenses • Lab and Lab Solution

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
9 hours 31 minutes
Difficulty
Intermediate
Video Description

This brief lesson offers the course agenda. This module will cover: • Definition, sample code, case study • Demos: sensitive information in HTML/Javascript comments, hidden or secret URLs, HTML5 Web Storage Manipulation • Mitigations, countermeasures and defenses • Lab and Lab Solution

Video Transcription
00:04
Hello and welcome to the side. I bury secure coding course my name Miss anywhere. And this is AWAS top 10 for 2013. A six sensitive data exposure.
00:17
Now for our agenda, we will, of course, look at our definition for sensitive data exposure. We're also going to take a look at various code samples or ways in which data can be exposed unintentionally.
00:36
And then finally, we're gonna have a case study to wrap up our explanation portion.
00:43
We're gonna follow that up with three demos. The first demo is going to be information that is disclosed through HTML or Java script comments.
00:57
The second demo is going to be
01:00
how we can expose hidden or secret. You are Els.
01:03
And then finally, the last is going to be a demonstration of HTML five Web storage manipulation.
01:14
Then we'll go into our defense is countermeasures in mitigation section, and then we'll wrap up with our lab in the lab solution
Up Next