There are many types of hackers and understanding the types and the motivations of each can help to build defenses.
- When I use the term hacker, … you might imagine a person at a computer … wearing a hoodie, scary looking, … but their face hidden from view. … But that's not what hackers look like. … In fact, hacker can have a positive meaning. … It can mean someone who tinkers … with computers and electronics … to come up with innovative ideas. … Many of today's most reputable technology companies … began as a couple of hackers experimenting in a garage. … Security professionals divide hackers into two types: … white hat and black hat. … This imagery draws inspiration from classic western movies. … The good cowboys wear white hats, … while the bad ones wear black hats. … Their skills may be the same, … but they have different intentions. … A white hat hacker is a security specialist … who uses their skills to improve security … by detecting vulnerabilities … before the malicious black hat hackers can exploit them. … Black hat hackers are the ones we want to protect against. … Black hat hackers fall into several categories, …
- Threat models
- Least privilege
- Defense in depth
- Validating and sanitizing input
- Credential attacks
- SQL injection
- Cross-site scripting
Skill Level Beginner
Web Programming Foundationswith Morten Rand-Hendriksen58m 44s Beginner
Web Security: Same-Origin Policieswith Sasha Vodnik1h 54m Advanced
1. Security Overview
2. General Security Principles
3. Filter Input, Control Output
4. The Most Common Attacks
Next steps2m 26s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.