Part 1 Intro

Video Activity

This brief lesson offers the course agenda. This module will cover: • Definition, sample code, case study • Demos: sensitive information in HTML/Javascript comments, hidden or secret URLs, HTML5 Web Storage Manipulation • Mitigations, countermeasures and defenses • Lab and Lab Solution

Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
9 hours 31 minutes
Difficulty
Intermediate
CEU/CPE
10
Video Description

This brief lesson offers the course agenda. This module will cover: • Definition, sample code, case study • Demos: sensitive information in HTML/Javascript comments, hidden or secret URLs, HTML5 Web Storage Manipulation • Mitigations, countermeasures and defenses • Lab and Lab Solution

Video Transcription
00:04
Hello and welcome to the side. I bury secure coding course my name Miss anywhere. And this is AWAS top 10 for 2013. A six sensitive data exposure.
00:17
Now for our agenda, we will, of course, look at our definition for sensitive data exposure. We're also going to take a look at various code samples or ways in which data can be exposed unintentionally.
00:36
And then finally, we're gonna have a case study to wrap up our explanation portion.
00:43
We're gonna follow that up with three demos. The first demo is going to be information that is disclosed through HTML or Java script comments.
00:57
The second demo is going to be
01:00
how we can expose hidden or secret. You are Els.
01:03
And then finally, the last is going to be a demonstration of HTML five Web storage manipulation.
01:14
Then we'll go into our defense is countermeasures in mitigation section, and then we'll wrap up with our lab in the lab solution
Up Next
Secure Coding

In the Secure Coding training course, Sunny Wear will show you how secure coding is important when it comes to lowering risk and vulnerabilities. Learn about XSS, Direct Object Reference, Data Exposure, Buffer Overflows, & Resource Management.

Instructed By