This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. We'll learn the basics of applying cryptography, such as encryption and secure hashing. We'll learn how attackers can exploit application vulnerabilities through the improper handling user-controlled data. We'll gain a fundamental understanding of injection problems in web applications, including the three most common types of injection problems: SQL injection, cross-site scripting, and command injection.
1-2 years of experience with some form of computer programming language like C/C++ or Java.
- 5 stars73.71%
- 4 stars20.51%
- 3 stars4.48%
- 1 star1.28%
來自IDENTIFYING SECURITY VULNERABILITIES的熱門評論
Perfect Course learn about mitigating vulnerabilities!
I really enjoyed the course just somethings need to be reviewed again so that it could be up to date
Excellent course with a broad coverage of all the aspects involved in Application Security, clearly explained and the peer graded labs were fun to do!
Threat Modeling and Week 4 code submission was very fruitful. Overall good content to learn for developers and Application Engineers.