Python Secure Coding Playbook
Offered By: Pluralsight
Course Description
Overview
Secure coding is a skill that every web developer needs to ensure they are protected from common vulnerabilities. This course teaches you about those vulnerabilities, how an attacker might exploit them, and how to avoid them in your Python websites.
There are a number of common vulnerabilities that can be exposed by a website which a malicious user can attack. This can result in anything from the website being defaced to the web server and all of its contents being accessed by unauthorized users. In this course, Python Secure Coding Playbook, you’ll learn to protect your websites from attack. First, you'll explore the most common vulnerabilities that you’re likely to see in a website. Then, you'll see what these vulnerabilities could allow an attacker to do and how they might do it. Finally, you’ll learn how to write your Python code to protect your website from attack. When you’re finished with this course, you’ll have the knowledge of secure coding in Python that you need to protect your website from the attacks that it is most likely to face.
There are a number of common vulnerabilities that can be exposed by a website which a malicious user can attack. This can result in anything from the website being defaced to the web server and all of its contents being accessed by unauthorized users. In this course, Python Secure Coding Playbook, you’ll learn to protect your websites from attack. First, you'll explore the most common vulnerabilities that you’re likely to see in a website. Then, you'll see what these vulnerabilities could allow an attacker to do and how they might do it. Finally, you’ll learn how to write your Python code to protect your website from attack. When you’re finished with this course, you’ll have the knowledge of secure coding in Python that you need to protect your website from the attacks that it is most likely to face.
Syllabus
- Course Overview 1min
- Secure Coding Principles 8mins
- Injection Flaws 13mins
- Broken Authentication 26mins
- Sensitive Data Exposure 12mins
- XML External Entities (XXE) 7mins
- Broken Access Control 12mins
- Security Misconfiguration 12mins
- Cross-Site Scripting (XSS) 15mins
- Insecure Deserialization 11mins
- Using Components with Known Vulnerabilities 7mins
- Insufficient Logging and Monitoring 13mins
Taught by
Gavin Johnson-Lynn
Related Courses
Exploiting and Securing Vulnerabilities in Java ApplicationsUniversity of California, Davis via Coursera Secure Software Development Fundamentals
Linux Foundation via edX Learn what's new in PHP 7
Udemy Secure Software Lifecycle Management for CSSLP®
Pluralsight CSSLP Cert Prep: 4 Secure Software Implementation
LinkedIn Learning