Massive 98% Discount On Cyber Security Professional Training In The HotHardware Shop
Description
- Understand the Security Code Review Guideline & the challenges that arise
- Study Threat Modeling to understand & rate the threats targeting your application
- Explore Buffer Overflow (program overruns the bugger’s boundary & overwrites adjacent memory)
- Learn Integer, Stack & Heap overflow via hand on labs
- Recognize web-based vulnerabilities & mitigate them
- Learn SQL Injection, Cross-site Scripting & File Inclusion via hands-on labs
- Understand Source Code Fuzzing w/ American Fuzzer Lab & Automated Analysis Techniques
- Use automated techniques to find bugs in source code
- Use scoping, fingerprinting & crawling w/ Burp Suite to gather info about targets
- Bypass access control to get into web-based systems
- Comprehend Cross-Site Request Forgery, an HTTP request sent on behalf of a victim’s browser
- Mitigate Injection attempts that attack users through files