Video Description

This lesson covers mitigations, countermeasures and defenses. Participants learn about the following defense methods: • Configurations • Integrity checks • Canonicalize path/files • Create and monitor thresholds Participants learn some sample code to use the defense methods.

Course Modules

Secure Coding