Secure Full Stack Developer Programming

Full Stack
  • 14 Videos | 1h 20m 37s
  • Includes Assessment
  • Earns a Badge
Likes 11 Likes 11
Explore essential best practices and concepts for secure Full Stack Development (FSD) programming in this 14-video course. Discover how to protect various layers in the FSD stack by configuring SSL (secure sockets layer), preventing and defending against attacks, analyzing logs, and cookie prefixing. Key concepts covered here include how secure programming applies to full stack developers; how to configure web servers to use SSL; and how to prevent cross-site forgery attacks. Next, learn to analyze logs with the ELK Stack; learn OWASP's top 10 security risks; learn how to configure HSTS on web servers; and learn how to prevent cross-site scripting attacks, when an attacker injects malicious client site code, most often Javascript, into a web application. Learn how to defend against click-jacking attacks, when an attacker wants the user to click something the user does not want to click; learn to prevent XSS attacks using CSP; and learn to prevent caching of sensitive data. Finally, learn how to identify cookie prefixing methods, and to prevent CSRF attacks by using the SameSite cookie attribute.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    identify how secure programming applies to Full Stack Developers
    configure your web server to use SSL
    prevent cross-site forgery attacks
    analyze logs using the ELK Stack
    identify OWASP's top 10 security risks
    configure HSTS on web servers
  • prevent cross-site scripting attacks
    defend against clickjacking attacks
    prevent XSS attacks using CSP
    prevent caching of sensitive data
    identify cookie prefixing methods
    prevent CSRF attacks using the Same-Site cookie attribute
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 43s
    UP NEXT
  • Playable
    2. 
    Full Stack Developer Secure Programming
    6m 21s
  • Locked
    3. 
    SSL Configuration
    7m 45s
  • Locked
    4. 
    Cross-Site Forgery Attack Prevention
    6m 6s
  • Locked
    5. 
    Analyze Logs Using the ELK Stack
    5m 12s
  • Locked
    6. 
    OWASP's Top 10 Security Risks
    8m 59s
  • Locked
    7. 
    Implement HTTP Strict Transport Protocol
    5m 19s
  • Locked
    8. 
    Prevent Cross-Site Scripting Attacks
    5m 5s
  • Locked
    9. 
    Defend Against Clickjacking Attacks
    4m 38s
  • Locked
    10. 
    Implement Content Security Policy
    5m 45s
  • Locked
    11. 
    Prevent Caching of Sensitive Data
    5m 1s
  • Locked
    12. 
    Cookie Prefixing
    5m 45s
  • Locked
    13. 
    Prevent Cross-Site Request Forgery Attacks
    5m 57s
  • Locked
    14. 
    Course Summary
    1m

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 7 Likes 7  
Likes 73 Likes 73