وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Principles of Secure Coding

سرفصل های دوره

Building Security in from the Beginning


1. Introduction
  • 1. Introduction
  • 2. Tools

  • 2. Secure Against What
  • 1. Introduction
  • 2. A Quick Security Primer
  • 3. Encoding, Encryption, and Serialization
  • 4.1 A Binary Deserialization Nightmare.html
  • 4.2 Man in the Middle Attack.html
  • 4. Demo Serialization and Security
  • 5. The Nature of Security on the Internet
  • 6. Accidental vs. Malicious Exposure
  • 7. Summary

  • 3. Version Control and Security
  • 1. Introduction
  • 2. Secrets Do Not Belong in Version Control
  • 3.1 Juan's Horror Story.html
  • 3. A Github Horror Story
  • 4. The Right Way to Control Secrets
  • 5. How to Avoid Secrets
  • 6. Demo Coding with Secrets
  • 7.1 The (Fictional) Day Google Forgot to Check Passwords.html
  • 7. The Day Google Forgot to Check Passwords
  • 8. Summary

  • 4. Secure Coding Practices
  • 1. Introduction
  • 2.1 The ColdFusion Reflection Vulnerability.html
  • 2.2 Unsafe Use of Reflection.html
  • 2. Reflection Attacks
  • 3.1 The Word from Microsoft on Anonymous Types.html
  • 3. Working with Data Types Securely
  • 4. Demo A Look at a Function
  • 5.1 Don't Use SecureString.html
  • 5. A Note on C# and SecureString
  • 6.1 StackOverflow on Writing Your Own SecureString.html
  • 6.2 XKCD Wrench Security.html
  • 6. Never Write Your Own Encryption
  • 7. Serialization and Transport Pitfalls
  • 8.1 Code Access Security (CAS).html
  • 8.2 Microsoft's Recommendations.html
  • 8. Microsoft's Recommendations
  • 9.1 The Google Cloud Team on Containers vs VMs.html
  • 9. Mitigating with Virtualization Strategies
  • 10. Summary

  • 5. Storing Data Securely
  • 1. Introduction
  • 2. Securing Databases
  • 3. Hashing and Salt
  • 4. Transparent Data Encryption and Cloud Providers
  • 5.1 Low-Key KeyVault.html
  • 5. Demo Working with Secure Assets
  • 6. Once Again, Avoiding Secrets
  • 7. Logging and Security
  • 8.1 OWASP Logging Cheat Sheet.html
  • 8. Demo What Bad Logging Looks Like
  • 9. Summary

  • 6. Knowing the Attacks the OWASP Top Ten in 2021
  • 1. Introduction
  • 2.1 Broken Access Control.html
  • 2.2 The ApplyYourself Breach.html
  • 2. Broken Access Control
  • 3.1 Cryptographic Failures.html
  • 3. Cryptographic Failures
  • 4.1 Injection.html
  • 4. Injection
  • 5.1 Insecure Design.html
  • 5. Insecure Design
  • 6.1 Security Misconfiguration.html
  • 6. Security Misconfiguration
  • 7.1 Vulnerable and Outdated Components.html
  • 7. Vulnerable and Outdated Components
  • 8.1 Digital Identity Guidelines.html
  • 8. Identification and Authentication Failures
  • 9.1 Software and Data Integrity Failures.html
  • 9. Software and Data Integrity Failures
  • 10.1 Security Logging and Monitoring Failures.html
  • 10. Security Logging and Monitoring Failures
  • 11.1 Server-Side Request Forgery.html
  • 11. Server-Side Request Forgery
  • 12.1 OWASP Zap.html
  • 12. Demo OWASP ZAP
  • 13. Penetration Testing
  • 14. Summary

  • 7. Conclusion
  • 1.1 Principles of Deploying Code Securely.html
  • 1. Wrapping Things Up
  • 2. Final Exam.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 1297
    حجم: 1570 مگابایت
    مدت زمان: 189 دقیقه
    تاریخ انتشار: 26 دی 1401
    دیگر آموزش های این مدرس
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید