Chevron Left
Zurück zu Identifying Security Vulnerabilities

Bewertung und Feedback des Lernenden für Identifying Security Vulnerabilities von University of California, Davis

144 Bewertungen

Über den Kurs

This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. We'll learn the basics of applying cryptography, such as encryption and secure hashing. We'll learn how attackers can exploit application vulnerabilities through the improper handling user-controlled data. We'll gain a fundamental understanding of injection problems in web applications, including the three most common types of injection problems: SQL injection, cross-site scripting, and command injection. We'll also cover application authentication and session management where authentication is a major component of a secure web application and session management is the other side of the same coin, since the authenticated state of user requests need to be properly handled and run as one session. We'll learn about sensitive data exposure issues and how you can help protect your customer's data. We'll cover how to effectively store password-related information, and not to store the actual plaintext passwords. We'll participate in coding assignment that will help you to better understand the mechanisms for effectively storing password-related information. Along the way, we’ll discuss ways of watching out for and mitigating these issues and be able have some fun and exploit two different vulnerabilities in a web application that was designed to be vulnerable, called WebGoat....



2. Mai 2020

Instructor is very knowledgeable. Content was fantastic & modern. Quizzes weren't easy & really enforced the course content. My favorite course so far of the 4 part series.


15. Mai 2020

The course is really great and got to learn new & interesting concepts except that the webgoat installation tutorial/document is not up to date.

Filtern nach:

1 - 25 von 45 Bewertungen für Identifying Security Vulnerabilities

von Giorgio B

30. Okt. 2019

von Virgil L M

24. Mai 2020

von malromaithi

12. Nov. 2019

von Juan C Q V

27. Mai 2020

von Elizabeth B

27. Sep. 2022

von Edwin S

24. Dez. 2021

von Fernando D B G

18. Nov. 2019

von David A

3. Mai 2020

von luca m

2. Nov. 2020

von Hardik P T

16. Mai 2020

von Sanjeev K J

23. Okt. 2019


21. Mai 2020

von Ehiede R

28. Juli 2020

von Mahendiran

25. Juli 2020

von Deepak B

10. Dez. 2019

von Shimane M

16. Juli 2019

von Joseph O K

2. Juli 2020


6. Juli 2020

von Jason G

19. Nov. 2020

von Juan A G G

12. Juli 2021

von Jennifer Y

7. Sep. 2021

von Rus M

2. Feb. 2021

von Shyam R

18. Juni 2020

von Ajith G N

15. Mai 2020

von Howard S

19. Nov. 2019