Video Description

This lesson discusses a two-fold mitigation strategy: *input validation: whitelists, black lists and regular expressions (regex) *output encoding The instructor offers samples and discusses what to include when doing defensive coding with the emphasis that white list is more desirable than black list as black list is limited. It is also crucial to not use regex for all the fields as it nullifies the application.

Course Modules

Instructed By

Instructor Profile Image
CyDefe
Instructor