課程信息

100% 在線

立即開始,按照自己的計劃學習。

可靈活調整截止日期

根據您的日程表重置截止日期。

中級

1-2 years of experience with some form of computer programming language like C/C++ or Java.

完成時間大約為12 小時

建議:4 weeks of study, 2-5 hours/week...

英語(English)

字幕:英語(English)

您將獲得的技能

CryptographyAuthentication Methodssecure programming

100% 在線

立即開始,按照自己的計劃學習。

可靈活調整截止日期

根據您的日程表重置截止日期。

中級

1-2 years of experience with some form of computer programming language like C/C++ or Java.

完成時間大約為12 小時

建議:4 weeks of study, 2-5 hours/week...

英語(English)

字幕:英語(English)

教學大綱 - 您將從這門課程中學到什麼

1
完成時間為 5 小時

Foundational Topics in Secure Programming

In this module, you will gain exposure to the ideas of threat modeling and applied cryptography. By the end of the module, you will be able to start to create threat models, and think critically about the threat models created by other people. You will be able to apply the STRIDE Method to your threat model and distinguish the trust boundaries in a given system. You will also gain a basic understanding of applied cryptography, such as encryption and secure hashing.

...
14 個視頻 (總計 83 分鐘), 3 個閱讀材料, 2 個測驗
14 個視頻
The STRIDE Method Via Example9分鐘
STRIDE Threats In More Detail Via Example4分鐘
Trust Boundaries2分鐘
Cryptography Basics Introduction3分鐘
Cryptography Basics: Block Ciphers9分鐘
Cryptography Basics: Symmetric and Asymmetric Cryptography5分鐘
Cryptography Basics: Hash Functions9分鐘
Cryptography Basics: Application to Threat Models4分鐘
Lab: Threat Model Activity3分鐘
OWASP Top 10 Proactive Controls and Exploits - Part 16分鐘
OWASP Top 10 Proactive Controls and Exploits - Part 29分鐘
3 個閱讀材料
A Note From UC Davis10分鐘
Welcome to Peer Review Assignments!10分鐘
Reading and Resource20分鐘
1 個練習
Module 1 Quiz30分鐘
2
完成時間為 3 小時

Injection Problems

By the end of this module, you will have a fundamental understanding of injection problems in web applications. You'll be able to discuss and describe the three most common types of injection problems: SQL injection, cross-site scripting, and command injection. In order to drive home these concepts, you will be able to work on exploiting a SQL injection vulnerability in the WebGoat application. You'll be able to formulate plans to mitigate injection problems in your applications.

...
17 個視頻 (總計 87 分鐘), 1 個閱讀材料, 1 個測驗
17 個視頻
Mitigating SQL Injection Using Prepared Statements3分鐘
Mitigating SQL Injection Using Stored Procedures3分鐘
Mitigating SQL Injection Using Whitelisting2分鐘
Injection Problems in Real Life5分鐘
Solution Screencast for Lab: Exploit Using WebGoat's SQLi Example7分鐘
Cross-Site Scripting Introduction3分鐘
HTTP and Document Isolation8分鐘
DOM, Dynamically Generating Pages, and Cross-Site Scripting7分鐘
The 3-Kinds of Cross-Site Scripting Vulnerabilities6分鐘
Comparing and Contrasting Cross-Site Scripting Vulnerabilities3分鐘
OWASP Prescribed Cross-site Scripting Prevention Rules - Part 16分鐘
OWASP Prescribed Cross-site Scripting Prevention Rules - Part 26分鐘
Command Injection Problems3分鐘
OWASP Proactive Controls Related to Injections4分鐘
1 個閱讀材料
Resources20分鐘
1 個練習
Module 2 Quiz30分鐘
3
完成時間為 4 小時

Problems Arising From Broken Authentication

By the end of this module, you will be able to evaluate a system to determine if it follows the generally prescribed secure methods for authentication and session management in web applications. You'll be able to distinguish the relationship between authentication, session management, and access control. You will also be able to exploit WebGoat's authentication and session management vulnerability. As well as be able to evaluate a system to determine if it performs sufficient security logging such that non-repudiation is enforced. This will help drive the concepts that you will learn in this module.

...
11 個視頻 (總計 71 分鐘), 1 個閱讀材料, 1 個測驗
11 個視頻
Handling Error Messages During Authentication4分鐘
Introduction to Session Management7分鐘
Enforcing Access Control with Session Management7分鐘
Session Management Threat: Bruteforce Session IDs10分鐘
Session Management Theat: Session Fixation Vulnerabilities3分鐘
Logging and Monitoring3分鐘
Solution for Lab #3: WebGoat’s Session Management Vulnerability9分鐘
OWASP Proactive Controls Related to Session Management and Authentication6分鐘
1 個閱讀材料
Resources20分鐘
1 個練習
Module 3 Quiz30分鐘
4
完成時間為 4 小時

Sensitive Data Exposure Problems

By the end of this module, you will understand how to effectively store password-related information, and NOT to store the actual plaintext passwords. You will also have a hands on coding assignment that will help you to better understand the mechanisms for effectively storing password-related information. Ready?

...
9 個視頻 (總計 36 分鐘), 1 個閱讀材料, 2 個測驗
9 個視頻
Issue 2: Not Encrypting Sensitive Information2分鐘
Issue 3: Improperly Storing Passwords5分鐘
Slowing Down Password Bruteforce Attacks7分鐘
Issue 4: Using HTTP for Sensitive Client-server4分鐘
OWASP Proactive Controls Related to Sensitive Data Exposure3分鐘
Course Summary1分鐘
1 個閱讀材料
Resources20分鐘
1 個練習
Module 4 Quiz30分鐘

講師

Avatar

Sandra Escandor-O'Keefe

Offensive Security Engineer at Fastly
Continuing and Professional Education

關於 加州大学戴维斯分校

UC Davis, one of the nation’s top-ranked research universities, is a global leader in agriculture, veterinary medicine, sustainability, environmental and biological sciences, and technology. With four colleges and six professional schools, UC Davis and its students and alumni are known for their academic excellence, meaningful public service and profound international impact....

常見問題

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

還有其他問題嗎?請訪問 學生幫助中心