$49
Created by -
0.00
(0 ratings)
English
Wishlist
Overview
This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. We'll learn the basics of applying cryptography, such as encryption and secure hashing. We'll learn how attackers can exploit application vulnerabilities through the improper handling user-controlled data. We'll gain a fundamental understanding of injection problems in web applications, including the three most common types of injection problems: SQL injection, cross-site scripting, and command injection.
USD 49
Type: Online
This course includes
Taken this course?
Share your experience with other students
USD 49
Type: Online
This course includes
Taken this course?
Share your experience with other students
Identifying Security Vulnerabilities
Created by -
0.00
(0 ratings)
Start Date: February 10th 2021
Course Description
This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. We'll learn the basics of applying cryptography, such as encryption and secure hashing. We'll learn how attackers can exploit application vulnerabilities through the improper handling user-controlled data. We'll gain a fundamental understanding of injection problems in web applications, including the three most common types of injection problems: SQL injection, cross-site scripting, and command injection.
The information used on this page is how each course is described on the Coursera platform.
Course Structure
Tags
Mark Complete
About the Instructor
Sandra Escandor-O'Keefe,University of California, Davis
No Reviews at this moment.