OWASP 2014 Top 10 Proactive Web Application Controls

OWASP 2014 Top 10 Proactive Web Application Controls

via YouTube Direct link

Validating File Uploads

18 of 32

18 of 32

Validating File Uploads

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

OWASP 2014 Top 10 Proactive Web Application Controls

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 SQL Injection Attack - Example
  3. 3 SQL Injection Attack - Solution
  4. 4 Parameterization References
  5. 5 Anatomy of a XSS Attack
  6. 6 Context Matters!
  7. 7 XSS Defense by Data Type and Context
  8. 8 HTML Body Context
  9. 9 HTML Attribute Context
  10. 10 HTTP GET Parameter Context
  11. 11 URL Context
  12. 12 JavaScript Variable Context
  13. 13 JSON Parsing Context
  14. 14 DOM-Based XSS Defense
  15. 15 Encoding Libraries
  16. 16 Encode Data Tools
  17. 17 Regular Expressions
  18. 18 Validating File Uploads
  19. 19 Input Validation References
  20. 20 Input Validation Tools
  21. 21 CWE "Monster Mitigations"
  22. 22 Conclusion: Ask Two Questions
  23. 23 Apache Shiro Architecture
  24. 24 Code to the Activity with Shiro
  25. 25 Access Control in the Browser
  26. 26 Access Controls References
  27. 27 Access Controls Tools
  28. 28 The Basic Hash is Dead
  29. 29 Password Guidance 3a
  30. 30 Password Guidance 3b
  31. 31 Password Policy
  32. 32 Universal 2nd Factor (U2F) protocol

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.