Video Description

This lesson covers mitigations, countermeasures and defenses. The instructor discusses the following defenses: • Authorization checks • Tokenization • Combo (AuthZ and Tokens) This lesson also discusses tokenization, which maps a token in place of the direct object. In and of itself, the token is inert and harmless, of no value if it is taken out of context.

Course Modules

Secure Coding