Learn what next steps will help bolster website security.
- Thank you for watching this course … on the foundations of web security. … We've covered general security principles, … the importance of filtering input and controlling output … and looked at some of the most common attacks. … Before I leave you, there are a few additional points … I'd like to share with you which do not fit neatly … into the previous chapters, but which are very important. … First, it is essential to regularly update all software. … Security vulnerabilities are reported … and patched constantly. … Hackers pay attention when security fixes … are released so that they can quickly use … the vulnerabilities before everyone upgrades. … When a new version comes out, patch immediately … so that you win the race against the hackers. … Second, back up your data, code, database data, … configurations, assets, everything. … Make automatic backups, as well as backups … to an offline hard drive. … is to maintain data availability. … Hard drive failure, hosting companies being unavailable …
- Threat models
- Least privilege
- Defense in depth
- Validating and sanitizing input
- Credential attacks
- SQL injection
- Cross-site scripting
Skill Level Beginner
Web Programming Foundationswith Morten Rand-Hendriksen58m 44s Beginner
Web Security: Same-Origin Policieswith Sasha Vodnik1h 54m Advanced
1. Security Overview
2. General Security Principles
3. Filter Input, Control Output
4. The Most Common Attacks
Next steps2m 26s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.