Section 1: You, This Course and Us |
|
Lecture 1 |
|
01:48 |
Section 2: What Is Security? |
|
Lecture 2 |
|
13:41 |
|
Lecture 3 |
|
10:12 |
Section 3: Cross Site Scripting |
|
Lecture 4 |
|
12:59 |
|
Lecture 5 |
|
13:05 |
|
Lecture 6 |
|
12:59 |
|
Lecture 7 |
|
11:15 |
Section 4: User Input Sanitization And Validation |
|
Lecture 8 |
|
12:09 |
|
Lecture 9 |
|
08:10 |
|
Lecture 10 |
|
14:07 |
|
Lecture 11 |
|
09:16 |
|
Lecture 12 |
|
07:03 |
Section 5: The Content Security Policy Header |
|
Lecture 13 |
|
11:23 |
|
Lecture 14 |
|
08:40 |
|
Lecture 15 |
|
08:13 |
|
Lecture 16 |
|
11:27 |
Section 6: Credentials Management |
|
Lecture 17 |
Broken authentication and session management
Preview
|
03:05 |
|
Lecture 18 |
|
05:24 |
|
Lecture 19 |
|
13:17 |
|
Lecture 20 |
Learn by example - login authentication
|
10:29 |
|
Lecture 21 |
A little bit about hashing
|
10:34 |
|
Lecture 22 |
All about passwords - Recovery
|
14:25 |
Section 7: Session Management |
|
Lecture 23 |
|
06:21 |
|
Lecture 24 |
Anatomy of a session attack
Preview
|
06:34 |
|
Lecture 25 |
Session hijacking - count the ways
|
04:53 |
|
Lecture 26 |
Learn by example - sessions without cookies
|
14:40 |
|
Lecture 27 |
Session ids using hidden form fields and cookies
|
04:08 |
|
Lecture 28 |
Session hijacking using session fixation
|
08:09 |
|
Lecture 29 |
Session hijacking counter measures
|
03:58 |
|
Lecture 30 |
Session hijacking - sidejacking, XSS and malware
|
03:10 |
Section 8: SQL Injection |
|
Lecture 31 |
|
05:17 |
|
Lecture 32 |
Learn by example - how does SQLi work?
|
09:26 |
|
Lecture 33 |
Anatomy of a SQLi attack - unsanitized input and server errors
|
08:42 |
|
Lecture 34 |
Anatomy of a SQLi attack - table names and column names
|
06:19 |
|
Lecture 35 |
Anatomy of a SQLi attack - getting valid credentials for the site
|
05:22 |
|
Lecture 36 |
|
08:09 |
|
Lecture 37 |
SQLi mitigation - parameterized queries and stored procedures
|
07:47 |
|
Lecture 38 |
SQLi mitigation - Escaping user input, least privilege, whitelist validation
|
06:33 |
Section 9: Cross Site Request Forgery |
|
Lecture 39 |
|
10:00 |
|
Lecture 40 |
Learn by example - XSRF with GET and POST parameters
|
07:25 |
|
Lecture 41 |
XSRF mitigation - The referer, origin header and the challenge response
|
05:46 |
|
Lecture 42 |
|
09:13 |
Section 10: Lot's Of Interesting Bits Of Information |
|
Lecture 43 |
The Open Web Application Security Project
Preview
|
08:10 |
|
Lecture 44 |
2 factor authentications and OTPs
|
11:04 |
|
Lecture 45 |
|
09:00 |
Section 11: Direct Object Reference |
|
Lecture 46 |
The direct object reference attack - do not leak implementation details
|
09:19 |
|
Lecture 47 |
Direct object reference mitigations
|
04:55 |
Section 12: IFrames |
|
Lecture 48 |
IFrames come with their own security concerns
|
06:46 |
|
Lecture 49 |
|
09:02 |
Section 13: One last word |
|
Lecture 50 |
Wrapping up the OWASP top 10 list
|
07:42 |
Section 14: PHP and MySQL Install And Set Up |
|
Lecture 51 |
|
09:45 |
|
Lecture 52 |
|
03:04 |
|
Lecture 53 |
|
11:55 |
|
Lecture 54 |
|
07:03 |
|
Lecture 55 |
|
17:32 |
|
Lecture 56 |
|
01:06 |