Add to wishlistAdded to wishlistRemoved from wishlist 0
Add to compare8.0/10
(Our Score)
Product is rated as #28 in category Cyber Security
Coat your website with armor, protect yourself against the most common threats and vulnerabilities. Understand, with examples, how common security attacks work and how to mitigate them. Learn secure practices to keep your website users safe.
Let’s parse that.
What’s included in this course:
Instructor Details
Loony CornAn ex-Google, Stanford and Flipkart team
Courses : 23
Votes: 0
Courses : 23
Specification: Web Security: Common Vulnerabilities And Their Mitigation
|
8 reviews for Web Security: Common Vulnerabilities And Their Mitigation
3.5 out of 5
★★★★★
★★★★★
2
★★★★★
3
★★★★★
1
★★★★★
1
★★★★★
1
Write a review
Show all
Most Helpful
Highest Rating
Lowest Rating
Add a review Cancel reply
This site uses Akismet to reduce spam. Learn how your comment data is processed.
Price | $12.99 |
---|---|
Provider | |
Duration | 8 hours |
Year | 2018 |
Level | All |
Language | English |
Certificate | Yes |
Quizzes | No |
Web Security: Common Vulnerabilities And Their Mitigation
$94.99 $12.99
Shiva –
This course keeps track of all the concepts that are required by basic security class. Good introduction to start with.
Yaw Acquaah –
Excellent. Would like to take a lot more courses from this particular instructor. Please provide other courses taught by the same instructor.
Schean Lee –
good content and good presentation
Anandi Merchant –
This is exactly what I was looking for. I really liked the instructor. Easy to follow, knowledgeable and very understandable.
Bharat Mishra –
it is really good explanation
Adrsh S Shettigar –
full asahya
K H –
This course has really good content for a beginner. It does go into some intermediate information, but only lightly touches on it. The password storage section I think is really poor as it walks you through insecurely storing passwords with just a simple hash. The next lecture talks about salting passwords, but it’s short and does not give any code examples. Also, the very last lecture should probably be the first lecture. You need to have XAMPP, or WAMP, or LAMP up and running before you can run through any of the examples given. But the last lecture is the lecture that walks you through the installation and configuration, which means that you are unable to follow along with code examples, unless you already know how to set those up.
Bob Maier –
While it provided good information, several of the mitigations it provided were not completely valid. For example stored procs can be written in a way that permit SQLi attackes to occur.