Chevron Left
返回到 Identifying Security Vulnerabilities

学生对 加州大学戴维斯分校 提供的 Identifying Security Vulnerabilities 的评价和反馈

4.6
154 个评分

课程概述

This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. We'll learn the basics of applying cryptography, such as encryption and secure hashing. We'll learn how attackers can exploit application vulnerabilities through the improper handling user-controlled data. We'll gain a fundamental understanding of injection problems in web applications, including the three most common types of injection problems: SQL injection, cross-site scripting, and command injection. We'll also cover application authentication and session management where authentication is a major component of a secure web application and session management is the other side of the same coin, since the authenticated state of user requests need to be properly handled and run as one session. We'll learn about sensitive data exposure issues and how you can help protect your customer's data. We'll cover how to effectively store password-related information, and not to store the actual plaintext passwords. We'll participate in coding assignment that will help you to better understand the mechanisms for effectively storing password-related information. Along the way, we’ll discuss ways of watching out for and mitigating these issues and be able have some fun and exploit two different vulnerabilities in a web application that was designed to be vulnerable, called WebGoat....

热门审阅

DA

May 2, 2020

Instructor is very knowledgeable. Content was fantastic & modern. Quizzes weren't easy & really enforced the course content. My favorite course so far of the 4 part series.

HT

May 15, 2020

The course is really great and got to learn new & interesting concepts except that the webgoat installation tutorial/document is not up to date.

筛选依据:

1 - Identifying Security Vulnerabilities 的 25 个评论(共 46 个)

创建者 Giorgio B

Oct 30, 2019

创建者 Virgil L M

May 24, 2020

创建者 malromaithi

Nov 12, 2019

创建者 Juan C Q V

May 27, 2020

创建者 Elizabeth B

Sep 27, 2022

创建者 Edwin S

Dec 24, 2021

创建者 Fernando D B G

Nov 18, 2019

创建者 David A

May 3, 2020

创建者 luca m

Nov 2, 2020

创建者 Hardik P T

May 16, 2020

创建者 Sanjeev K J

Oct 23, 2019

创建者 DEEPAK J

May 21, 2020

创建者 Ehiede R

Jul 28, 2020

创建者 Mahendiran

Jul 25, 2020

创建者 Deepak B

Dec 10, 2019

创建者 Shimane M

Jul 16, 2019

创建者 Joseph O K

Jul 2, 2020

创建者 NITESH K S

Jul 6, 2020

创建者 jason g

Nov 19, 2020

创建者 Juan A G G

Jul 12, 2021

创建者 Jennifer Y

Sep 7, 2021

创建者 Rus M

Feb 2, 2021

创建者 Shyam R

Jun 18, 2020

创建者 Ajith G N

May 15, 2020

创建者 Howard S

Nov 19, 2019