From the course: CertNexus Cyber Secure Coder (CSC-110) Cert Prep
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Solution: Find vulnerabilities
From the course: CertNexus Cyber Secure Coder (CSC-110) Cert Prep
Solution: Find vulnerabilities
- [Daniel] All right welcome back everybody To another episode of ITProTV. (indistinct chatter) (upbeat music) - [Announcer] You're watching ITProTV. - Greetings everyone and welcome back to another exciting episode of ITProTV. I'm your host, Daniel Lowrie. In today's episode we are going to be dipping right back in to our cyber secure coder series and joining us back in the studio as always, I know you're excited about it, I sure am, our good friend, Mr. Justin Dennison. Justin, glad to have you, sir. How goes it? - It's going fairly well and we're actually diving into some code now so it makes me happy. I don't know about you, Daniel, Does that make you... - All I can see is like a glow coming from around your person. - Yeah. Yeah. I'm pretty excited. You know, some of those other parts are important so we all have the same foundation but me, I like doing things, right? I like digging in. And part…
Contents
-
-
- Prior knowledge and expectations4m 50s
- (Locked) Gather software requirements13m 17s
- (Locked) Challenge: Identity requirements2m 6s
- (Locked) Solution: Identify requirements8m 18s
- (Locked) Factors that undermine software security10m 39s
- (Locked) Software vulnerabilities and attack phases9m 38s
- (Locked) Attack patterns19m 18s
- (Locked) Challenge: Find vulnerabilities3m 8s
- (Locked) Solution: Find vulnerabilities10m 18s
- (Locked) Challenge: New password requirements3m 12s
- (Locked) Solution: New password requirements9m 22s
- (Locked) Challenge: Hashing passwords3m 42s
- (Locked) Solution: Hashing passwords19m 1s
- (Locked) Vulnerability intelligence13m 13s
- (Locked) Challenge: Vulnerability search4m 2s
- (Locked) Solution: Vulnerability search15m 31s
-
-
-
-
-
-