Secure Coding in Go - Avoiding Common Vulnerabilities

Secure Coding in Go - Avoiding Common Vulnerabilities

Gopher Academy via YouTube Direct link

Injections

4 of 32

4 of 32

Injections

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Secure Coding in Go - Avoiding Common Vulnerabilities

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Have a secure mindset
  3. 3 What is user input
  4. 4 Injections
  5. 5 Iterable IDs
  6. 6 University Unique Identifier
  7. 7 SQL Injection
  8. 8 Making Friends
  9. 9 Login Bypass
  10. 10 Valid Login
  11. 11 Unsafe File Upload
  12. 12 More Slides
  13. 13 Reflecting XSS
  14. 14 More vulnerabilities
  15. 15 Encoding vs Encryption
  16. 16 face bomb
  17. 17 encrypted gopher
  18. 18 encryption
  19. 19 TLS handshake
  20. 20 What can you do
  21. 21 Best Practices
  22. 22 hashing vs encryption
  23. 23 argon2id
  24. 24 OWASP
  25. 25 Supply chain
  26. 26 Famous attacks
  27. 27 Thirdparty libraries
  28. 28 Linus
  29. 29 Verified Unverified
  30. 30 Recap
  31. 31 Be Proactive
  32. 32 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.