Join Kevin Skoglund for an in-depth discussion in this video Conversions and transformations, part of Foundations of Programming: Web Security.
Data conversions and transformations…can become a major security concern.…In physics, whenever light passes through…glass that has a different density,…the light changes direction slightly.…To me, that seems like a good metaphor…for what happens when we convert and transform data.…The data's still the same,…but it changes ever so slightly in the process.…And it's up to us to notice…and allow for those subtle changes.…Whenever we're working with data…and we're converting it between two different formats,…we need to use caution.…So, you might be converting JSON objects into arrays,…in whatever programming language you prefer.…
This course is great for developers who want to secure their client's websites, and for anyone else who wants to learn more about web security.
- Why security matters
- What is a hacker?
- How to write a security policy
- Cross-site scripting (XSS)
- Cross-site request forgery (CSRF)
- SQL injection
- Session hijacking and fixation
- Passwords and encryption
- Secure credit card payments
Skill Level Beginner
1. Security Overview
2. General Security Principles
3. Filtering Input, Controlling Output
4. The Most Common Attacks
5. Encryption and User Authentication
6. Other Areas of Concern
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.