Completed
Security Controls: Security Logging
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Security Vulnerabilities Decomposition - Another Way to Look at Vulnerabilities
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 After Report
- 3 SQL Injection: Classification
- 4 Decompose the Injection Data interpreted as Code
- 5 Extract Security Controls
- 6 Security Controls: Security Logging
- 7 Best Types of Detection Points
- 8 Examples of Intrusion Detection Points
- 9 Secure Data Handling: Basic Workflow
- 10 Storage by Data Types
- 11 Data at Rest: Design Vulnerability Example
- 12 Security Controls: Data at Rest Encryption Cryptographic Storage
- 13 Security Controls: Data in Transit
- 14 Root Cause The type of software with vulnerable components
- 15 Fundamental Security Principle
- 16 Components Examples
- 17 Implement a Logging Library
- 18 Simple Wrapper
- 19 Implement a Payment Gateway Scenario • Vendor APS-line payment gateways . Can have more than one payment gateway in an application • Required to be interchangeable
- 20 Adapter Design Pattern
- 21 Implement a Single Sign-On
- 22 Façade Design Pattern
- 23 Secure Software Starts from Design!
- 24 Configuration Hardening
- 25 Final Takeaways
- 26 Security Controls for Secure Development
- 27 Global AppSee Amsterdam