Course description
In this course we'll be digging more deeply into the OWASP Threat list. How vulnerable are you if your frameworks, servers and applications are not configured correctly, left in out-of-the-box configurations, or are not kept up-to-date? Then we'll move into Sensitive Data Exposure and techniques to store data. Finally, we'll cover insecure versus secure cryptography, what data needs to be protected, and why you should protect it.
Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.
Prerequisites
This course is for users with experience with developing web applications using C# or other object oriented programming languages.
Meet the expert
Don Kiely is a featured instructor on many of our SQL Server and Visual Studio courses. He is a nationally recognized author, instructor, and consultant specializing in Microsoft technologies. Don has many years of teaching experience, is the author or co-author of several programming books, and has spoken at many industry conferences and user groups. In addition, Don is a consultant for a variety of companies that develop distributed applications for public and private organizations.
Video Runtime
126 Minutes
Time to complete
229 Minutes
Course Outline
Security Misconfiguration (20:49)
Misconfiguration Examples (29:16)
Sensitive Data Exposure (31:46)
Insecure Cryptographic Storage (27:00)
Function Level Access Control (17:58)