Java Basics - Java Security Vulnerability, Exploits and Mitigation

preview_player
Показать описание
How do we prevent a Java security vulnerability from becoming an exploit?

What sort of vulnerabilities can we even expect when working with a Java project?

How can we protect ourselves from these vulnerabilities?

All these answers and more in this video.

All you need to know to learn Java with this course is basic grade school algebra and the ability to install software. We start from the very basic concepts of programming to build simple Java applications. Once completed we will connect this course to the "Modern Java Course" and "Debugging at Scale in Production" course.

This course updates weekly, please use the comments section below to ask questions and make requests. We'll try to help.

Title: Java Basics - Java Object Oriented Programming (OOP) | Java Tutorial

✅ Stay Connected With Me.

=============================

✅ Recommended Playlists:

👉 Practical Debugging at Scale Course - Module 1:

✅ Other Videos You Might Be Interested In Watching:

👉 Practical Debugging at Scale Part 3: Watch and Evaluate

👉 Practical Debugging at Scale Part 2: Program Control Flow

👉 Practical Debugging at Scale Part 1: Introduction

=============================

=================================

Disclaimer: We do not accept any liability for any loss or damage which is incurred from you acting or not acting as a result of listening to any of our publications. For all videos on my channel: This information is for general & educational purposes only. Always consult with an attorney, CPA, or financial professional for advice based on your specific situation

Copyright Disclaimer: Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use

© Debug Agent

#java #course #learntocode #learnprogramming #learnprogrammingonyoutube #learning #codingtutorial #javaforbeginners #softwaredeveloper #softwareengineering #programmingtutorial #javaprogrammingforbeginners #javaprogramming

java security vulnerability,learn java,java programming,java tutorial,Java course,java security vulnerablility,security vulnerability in java application,security vulnerablility in java application,security vulnerability in java aplication,security vulnerablility in java aplication,java security,java exploits,java security tutorial,java security interview questions,java secure coding,java security project,java secure coding guidelines

00:00 Introduction
00:36 Phone Scanning - Youthful Hacking
01:45 Insecure Direct Object References (IDOR)
02:37 IDOR Mitigation
03:28 What's a Vulnerability?
03:57 What's an Exploit?
04:54 SQL Injection Vulnerability
05:56 SQL Injection Mitigation
06:25 Serialization Vulnerabilities
06:57 Cross-Site Scripting (XSS)
07:41 Types of XSS: Stored, Reflected and DOM-Based
08:44 Mitigating an XSS Vulnerability
10:15 Unvalidated Redirects and Forwards Vulnerability
11:24 Server Side Request Forgery (SSRF) Vulnerability
11:42 Cross-Site Request Forgery (CSRF)
12:40 CSRF Mitigation
13:18 Final Word
Рекомендации по теме