Defensive Coding for C#

Defensive Coding C#
  • 15 Videos | 1h 9m 12s
  • Includes Assessment
  • Earns a Badge
Likes 26 Likes 26
To program defensively, you must know what to look for. Explore common risks to C#, how to counter common risks, regular expressions, and the best way to deal with bad data.

WHAT YOU WILL LEARN

  • list potential risks to C# UI applications
    describe what buffer overflows are and their impact
    identify how to prevent buffer overflows
    identify what form injection attacks typically take in C# applications
    describe how to mitigate injection attacks in C# applications
    identify how to prevent shatter attacks in .NET applications
    recognize how to prevent DLL highjacking in .NET applications
    use exceptions in C# applications
  • specify how to deal with bad data in your C# applications
    how to use input validation in a C# application
    how to use regular express to help in input validation
    recognize how to constrain user input to prevent bad data input
    describe what SQL injection attacks are
    recognize how to use Stored Procdures to aid in the defense of SQL injection attacks
    describe some of the pitfalls of using dynamic SQL

IN THIS COURSE

  • Playable
    1. 
    Potential UI Application Risks
    3m 1s
    UP NEXT
  • Playable
    2. 
    Buffer Overflows in C# Applications
    2m 58s
  • Locked
    3. 
    Preventing Buffer Overflows
    3m 53s
  • Locked
    4. 
    Injection Attacks in C# Applications
    5m 20s
  • Locked
    5. 
    Mitigating Injection Attacks
    3m 36s
  • Locked
    6. 
    Windows Shatter Attacks
    3m 10s
  • Locked
    7. 
    Preventing DLL Highjacking in .NET Applications
    4m 41s
  • Locked
    8. 
    Using Exceptions in C# Applications
    4m 42s
  • Locked
    9. 
    Dealing with Bad Data
    4m 51s
  • Locked
    10. 
    Validating Input
    4m 49s
  • Locked
    11. 
    Using Regular Expressions
    4m 4s
  • Locked
    12. 
    Constraining User Input
    5m 14s
  • Locked
    13. 
    SQL Injection Attacks
    3m 39s
  • Locked
    14. 
    Stored Procedures
    4m 13s
  • Locked
    15. 
    Dynamic SQL
    4m 31s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 59 Likes 59  
Likes 26 Likes 26  
Likes 8 Likes 8  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 31 Likes 31  
Likes 26 Likes 26  
COURSE SOLID & GRASP
Likes 3218 Likes 3218