In this course, we will wear many hats. With our Attacker Hats on, we will exploit Injection issues that allow us to steal data, exploit Cross Site Scripting issues to compromise a users browser, break authentication to gain access to data and functionality reserved for the ‘Admins’, and even exploit vulnerable components to run our code on a remote server and access some secrets. We will also wear Defender Hats. We will dive deep in the code to fix the root cause of these issues and discuss various mitigation strategies. We do this by exploiting WebGoat, an OWASP project designed to teach penetration testing. WebGoat is a deliberately vulnerable application with many flaws and we take aim at fixing some of these issues. Finally we fix these issues in WebGoat and build our patched binaries. Together we will discuss online resources to help us along and find meaningful ways to give back to the larger Application Security community.
Dieser Kurs ist Teil der Spezialisierung Spezialisierung Secure Coding Practices
von
Über diesen Kurs
Könnte Ihr Unternehmen von Mitarbeiterweiterbildungen für gefragte Kompetenzen profitieren?
Probieren Sie Coursera for Business ausWas Sie lernen werden
Practice protecting against various kinds of cross-site scripting (XSS) attacks.
Form plans to mitigate injection vulnerabilities in your web application.
Create strategies and controls to provide secure authentication.
Examine code to find and patch vulnerable components.
Kompetenzen, die Sie erwerben
- Java
- secure programming
- Java Programming
- security
Könnte Ihr Unternehmen von Mitarbeiterweiterbildungen für gefragte Kompetenzen profitieren?
Probieren Sie Coursera for Business ausLehrplan - Was Sie in diesem Kurs lernen werden
Setup and Introduction to Cross Site Scripting Attacks
Injection Attacks
Authentication and Authorization
Dangers of Vulnerable Components and Final Project
Bewertungen
- 5 stars70,17 %
- 4 stars17,54 %
- 3 stars3,50 %
- 2 stars3,50 %
- 1 star5,26 %
Top-Bewertungen von EXPLOITING AND SECURING VULNERABILITIES IN JAVA APPLICATIONS
Great course, got lot to earn about vulnerabilities and their mitigation strategies
course is good but it seems like, i am learner of this course..There is no one who can review my asginments -_-'
Very Good course material. dicover it, try it, fix it method.
Excellent and really helpful material... By far the best and most interesting course in the series!
Über den Spezialisierung Secure Coding Practices

Häufig gestellte Fragen
Wann erhalte ich Zugang zu den Vorträgen und Aufgaben?
Was bekomme ich, wenn ich diese Spezialisierung abonniere?
Ist finanzielle Unterstützung möglich?
Haben Sie weitere Fragen? Besuchen Sie das Learner Help Center.