Completed
Access Controls References
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
OWASP 2014 Top 10 Proactive Web Application Controls
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 SQL Injection Attack - Example
- 3 SQL Injection Attack - Solution
- 4 Parameterization References
- 5 Anatomy of a XSS Attack
- 6 Context Matters!
- 7 XSS Defense by Data Type and Context
- 8 HTML Body Context
- 9 HTML Attribute Context
- 10 HTTP GET Parameter Context
- 11 URL Context
- 12 JavaScript Variable Context
- 13 JSON Parsing Context
- 14 DOM-Based XSS Defense
- 15 Encoding Libraries
- 16 Encode Data Tools
- 17 Regular Expressions
- 18 Validating File Uploads
- 19 Input Validation References
- 20 Input Validation Tools
- 21 CWE "Monster Mitigations"
- 22 Conclusion: Ask Two Questions
- 23 Apache Shiro Architecture
- 24 Code to the Activity with Shiro
- 25 Access Control in the Browser
- 26 Access Controls References
- 27 Access Controls Tools
- 28 The Basic Hash is Dead
- 29 Password Guidance 3a
- 30 Password Guidance 3b
- 31 Password Policy
- 32 Universal 2nd Factor (U2F) protocol