Completed
Design Patterns for Integration
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Path of Secure Software
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 OWASP Top 10 Risks 2017 - RC2
- 3 Cyber attacks
- 4 OWASP Application Security Verification Standard
- 5 Verify for Security Early and Often
- 6 Parameterize Queries
- 7 XSS Payloads
- 8 Encode Your Output DO YOU WANT RSS
- 9 Contextual Encoding OWASP Java Encoder Project
- 10 Example of Validations
- 11 2nd Order SQL Injection Example
- 12 Vulnerabilities Addressed - All Top10!
- 13 Implement Authentication Controls
- 14 Strong cryptographic algorithms
- 15 Secure Password Storage
- 16 C5. Password Storage - How Not To Do It!
- 17 Implement Appropriate Access Controls
- 18 Implement Logging and Intrusion Detection
- 19 Examples of Intrusion Detection Points
- 20 Vulnerabilities Addressed - All Top 10!
- 21 Unmanaged 3rd Party Components
- 22 Design Patterns for Integration
- 23 Best Practices
- 24 Don't leak information
- 25 Project Page