YoVDO

Foundational JavaScript Security

Offered By: LinkedIn Learning

Tags

Ethical Hacking Courses Data Protection Courses Injection Attacks Courses Cyber Kill Chain Courses Snyk Courses Dependabot Courses

Course Description

Overview

Learn how to use tools like Synk, Dependabot, and AppSensor to examine vulnerabilities in your JavaScript applications and close the loopholes before hackers can exploit them.

Syllabus

Introduction
  • Foundational JavaScript security
  • What you should know
1. Introduction and Setup
  • What is ethical hacking?
  • Overview of cyber kill chain
  • Plan an attack strategy
  • Base project setup
  • Challenge: What is ethical hacking?
  • Solution: What is ethical hacking?
2. Reconnaissance
  • Reconnaissance introduction
  • Introduction and setup for Snyk
  • Introduction to GitHub Dependabot
  • Introduction to AppSensor
  • Reconnaissance applied to project
  • Challenge: What is the purpose of reconnaissance?
  • Solution: What is the purpose of reconnaissance?
3. Top Security Threats
  • Injection threat
  • Broken authentication
  • Sensitive data
  • XML external entities
  • Security misconfiguration
  • Insecure deserialization
  • Components with known vulnerabilities
  • Insufficient logging and monitoring
  • Challenge: What is the best resource for top threats?
  • Solution: What is the best resource for top threats?
4. Security Threats Applied
  • Injection threat resources
  • Broken authentication resources
  • Sensitive data exposure resources
  • XML external entities resources
  • Security misconfiguration resources
  • Secure deserialization resources
  • Challenge: What is secured deserialization?
  • Solution: What is secured deserialization?
Conclusion
  • Next steps

Taught by

Emmanuel Henri

Related Courses

Advanced Cyber Threat Intelligence
LinkedIn Learning
Cisco Certified CyberOps Associate (200-201) Cert Prep: 5 Security Policies and Procedures
LinkedIn Learning
CompTIA Cybersecurity Analyst+ (CySA+) (CS0-003) Cert Prep: 3 Incident Response and Management
LinkedIn Learning
Cybersecurity Foundations
LinkedIn Learning
Ethical Hacking: Introduction to Ethical Hacking
LinkedIn Learning