In this course, we will wear many hats. With our Attacker Hats on, we will exploit Injection issues that allow us to steal data, exploit Cross Site Scripting issues to compromise a users browser, break authentication to gain access to data and functionality reserved for the ‘Admins’, and even exploit vulnerable components to run our code on a remote server and access some secrets. We will also wear Defender Hats. We will dive deep in the code to fix the root cause of these issues and discuss various mitigation strategies. We do this by exploiting WebGoat, an OWASP project designed to teach penetration testing. WebGoat is a deliberately vulnerable application with many flaws and we take aim at fixing some of these issues. Finally we fix these issues in WebGoat and build our patched binaries. Together we will discuss online resources to help us along and find meaningful ways to give back to the larger Application Security community.
이 강좌에 대하여
귀하가 습득할 기술
- 5 stars70.17%
- 4 stars17.54%
- 3 stars3.50%
- 2 stars3.50%
- 1 star5.26%
EXPLOITING AND SECURING VULNERABILITIES IN JAVA APPLICATIONS의 최상위 리뷰
Great course, got lot to earn about vulnerabilities and their mitigation strategies
course is good but it seems like, i am learner of this course..There is no one who can review my asginments -_-'
Excellent and really helpful material... By far the best and most interesting course in the series!
Exploiting and Securing Vulnerabilities in Java Applications is by far the best course in this series. There are practical examples, live coding, and well organized.
Secure Coding Practices 특화 과정 정보
자주 묻는 질문
강의 및 과제를 언제 이용할 수 있게 되나요?
이 전문 분야를 구독하면 무엇을 이용할 수 있나요?
재정 지원을 받을 수 있나요?
궁금한 점이 더 있으신가요? 학습자 도움말 센터를 방문해 보세요.