Completed
Data at Rest: Design Vulnerability example
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Security Vulnerabilities Decomposition - Another Way to Look at Vulnerabilities
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Katy Anton
- 3 Common Weakness Enumeration
- 4 CWEs in Injection Category
- 5 Decompose the Injection
- 6 Extract Security Controls
- 7 Security Controls: Security Logging
- 8 The 6 Best Types of Detection Points
- 9 Examples of Intrusion Detection Points
- 10 Secure Data Handling: Basic Workflow
- 11 Data at Rest: Design Vulnerability example
- 12 Tool for Publicly Disclosed Machine Keys
- 13 Encryption: Security Controls
- 14 Data in Transit: Security Controls
- 15 State of Software Security
- 16 Root Cause
- 17 What is Attack Surface?
- 18 Fundamental Security Principle
- 19 Components Examples
- 20 Implement Logging Library
- 21 Simple Wrapper
- 22 Implement a Payment Gateway
- 23 Adapter Design Pattern
- 24 Implement a Single Sign-On
- 25 Facade Design Pattern
- 26 Secure Software Starts from Design!
- 27 Rick Rescorla
- 28 Security Controls In Development Cycle
- 29 Final Takeaways
- 30 References