Completed
Leverage Keyed Functions
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Top Ten Proactive Controls for Secure Software Development
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 WARNING
- 3 Security Architecture and Design
- 4 Security Requirements (SDLC) Functional requirements
- 5 OWASP Java Encoder Project orgindex.php OWASP Java Encoder Project
- 6 Password Defenses
- 7 Leverage Keyed Functions
- 8 Multi Factor Authentication
- 9 Forgot Password Secure Design
- 10 Access Control Anti-Patterns
- 11 Most Coders Hard-Code Roles in Code
- 12 Solving Real World Access Control Problems with the Apache Shiro
- 13 Content Security Policy
- 14 Anatomy of a SQL Injection Attack
- 15 Query Parameterization (PHP PDO)
- 16 Query Parameterization (PERL DBI)
- 17 Anatomy of a XSS Attack
- 18 Contextual Output Encoding (XSS Defense)
- 19 Other Encoding Libraries
- 20 Solving Real World Problems with the OWASP HTML Sanitizer Project
- 21 Encryption in Transit (HTTPS/TLS)
- 22 Fixing the TLS and the Certificate Authority System
- 23 Solving Real World Crypto Storage Problems With Google KeyCzar
- 24 App Layer Intrusion Detection
- 25 OWASP AppSensor (Java)