The Path of Secure Software

The Path of Secure Software

Devoxx via YouTube Direct link

Design Patterns for Integration

22 of 25

22 of 25

Design Patterns for Integration

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Path of Secure Software

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 OWASP Top 10 Risks 2017 - RC2
  3. 3 Cyber attacks
  4. 4 OWASP Application Security Verification Standard
  5. 5 Verify for Security Early and Often
  6. 6 Parameterize Queries
  7. 7 XSS Payloads
  8. 8 Encode Your Output DO YOU WANT RSS
  9. 9 Contextual Encoding OWASP Java Encoder Project
  10. 10 Example of Validations
  11. 11 2nd Order SQL Injection Example
  12. 12 Vulnerabilities Addressed - All Top10!
  13. 13 Implement Authentication Controls
  14. 14 Strong cryptographic algorithms
  15. 15 Secure Password Storage
  16. 16 C5. Password Storage - How Not To Do It!
  17. 17 Implement Appropriate Access Controls
  18. 18 Implement Logging and Intrusion Detection
  19. 19 Examples of Intrusion Detection Points
  20. 20 Vulnerabilities Addressed - All Top 10!
  21. 21 Unmanaged 3rd Party Components
  22. 22 Design Patterns for Integration
  23. 23 Best Practices
  24. 24 Don't leak information
  25. 25 Project Page

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.