Python Secure Coding Playbook
Offered By: Pluralsight
Course Description
Overview
Secure coding is a skill that every web developer needs to ensure they are protected from common vulnerabilities. This course teaches you about those vulnerabilities, how an attacker might exploit them, and how to avoid them in your Python websites.
There are a number of common vulnerabilities that can be exposed by a website which a malicious user can attack. This can result in anything from the website being defaced to the web server and all of its contents being accessed by unauthorized users. In this course, Python Secure Coding Playbook, you’ll learn to protect your websites from attack. First, you'll explore the most common vulnerabilities that you’re likely to see in a website. Then, you'll see what these vulnerabilities could allow an attacker to do and how they might do it. Finally, you’ll learn how to write your Python code to protect your website from attack. When you’re finished with this course, you’ll have the knowledge of secure coding in Python that you need to protect your website from the attacks that it is most likely to face.
There are a number of common vulnerabilities that can be exposed by a website which a malicious user can attack. This can result in anything from the website being defaced to the web server and all of its contents being accessed by unauthorized users. In this course, Python Secure Coding Playbook, you’ll learn to protect your websites from attack. First, you'll explore the most common vulnerabilities that you’re likely to see in a website. Then, you'll see what these vulnerabilities could allow an attacker to do and how they might do it. Finally, you’ll learn how to write your Python code to protect your website from attack. When you’re finished with this course, you’ll have the knowledge of secure coding in Python that you need to protect your website from the attacks that it is most likely to face.
Syllabus
- Course Overview 1min
- Secure Coding Principles 8mins
- Injection Flaws 13mins
- Broken Authentication 26mins
- Sensitive Data Exposure 12mins
- XML External Entities (XXE) 7mins
- Broken Access Control 12mins
- Security Misconfiguration 12mins
- Cross-Site Scripting (XSS) 15mins
- Insecure Deserialization 11mins
- Using Components with Known Vulnerabilities 7mins
- Insufficient Logging and Monitoring 13mins
Taught by
Gavin Johnson-Lynn
Related Courses
Artificial Intelligence for RoboticsStanford University via Udacity Intro to Computer Science
University of Virginia via Udacity Design of Computer Programs
Stanford University via Udacity Web Development
Udacity Programming Languages
University of Virginia via Udacity