基于 OWASP Top 10 的安全编码及实例
上次更新时间:2024-11-06
课程售价: 2.9 元
联系右侧微信客服充值或购买课程
课程内容
1 - Giriş
2 - Secure Coding - A012021 Broken Access Control
- 1 -Broken Access Control Explained (免费)
- 2 -Broken Access Control - Practical Example on a Vulnerable Web Application
- 3 -Vulnerable Code vs Secure Code - Example 1 (Broken Access Control)
- 4 -Vulnerable Code vs Secure Code - Example 2 (IDOR)
- 5 -Vulnerable Code vs Secure Code - Example (Rate Limiting)
- 6 -Broken Access Controls Prevention Guide
3 - Secure Coding - A022021 Cryptographic Failures
- 1 -Cryptographic Failures Explained
- 2 -Vulnerable Code vs Secure Code - Example 1 (Encryption, Weak Cipher Usage)
- 3 -Vulnerable Code vs Secure Code - Example 2 (Hard Coded Keys, StrongWeak Keys)
- 4 -Vulnerable Code vs Secure Code - Example 3 (Secure Hashing Algorithms)
- 5 -Cryptographic Failures Prevention Guide
4 - Secure Coding - A032021 Injections
5 - Secure Coding - A042021 Insecure Design
6 - Secure Coding - A052021 Security Misconfiguration
7 - Secure Coding - A062021 Vulnerable and Outdated Components
8 - Secure Coding - A072021 Identification and Authentication Failures
9 - Secure Coding - A082021 Software and Data Integrity Failures
10 - Secure Coding - A092021 Security Logging and Monitoring Failures
11 - Secure Coding - A102021 Server-Side Request Forgery
课程内容
11个章节 , 27个讲座
1 - Giriş
2 - Secure Coding - A012021 Broken Access Control
- 1 -Broken Access Control Explained (免费)
- 2 -Broken Access Control - Practical Example on a Vulnerable Web Application
- 3 -Vulnerable Code vs Secure Code - Example 1 (Broken Access Control)
- 4 -Vulnerable Code vs Secure Code - Example 2 (IDOR)
- 5 -Vulnerable Code vs Secure Code - Example (Rate Limiting)
- 6 -Broken Access Controls Prevention Guide
3 - Secure Coding - A022021 Cryptographic Failures
- 1 -Cryptographic Failures Explained
- 2 -Vulnerable Code vs Secure Code - Example 1 (Encryption, Weak Cipher Usage)
- 3 -Vulnerable Code vs Secure Code - Example 2 (Hard Coded Keys, StrongWeak Keys)
- 4 -Vulnerable Code vs Secure Code - Example 3 (Secure Hashing Algorithms)
- 5 -Cryptographic Failures Prevention Guide