Securing C# Applications

Intermediate
  • 11 videos | 58m 37s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 18 users Rating 4.4 of 18 users (18)
Discover how to protect your applications from attacks and bad data! During this course, you'll learn how to identify and defend your C#+ applications from potential risks and control user input to reduce the possibility of bad data entry. Topics include how to address potential UI application risks, such as buffer overflows, code injection attacks, formatted string attacks, and DLL hijacks. Next, specify how to handle bad data in your C# applications, and learn how to constrain user input to keep out malicious entries that can break your code. From there, you will learn how to validate user input through regular expressions, and write effective exception handlers. Finally, as a review exercise, you will create a C#/ASP.NET application that runs a contact page that applies defensive code and requires validated user input.

WHAT YOU WILL LEARN

  • Identify potential risks to c# ui applications
    Describe what buffer overflows are and how to limit their impact
    Recall how to prevent buffer overflows in c# applications
    Describe what code injection attacks are and how to mitigate them in c# applications
    Identify how to prevent formatted string vulnerabilities
    Recognize how to prevent dll hijacking in c# applications
  • Use exceptions in c# applications
    Specify how to handle bad data in your c# applications
    Work with regular expressions to help with input validation
    Recognize how to constrain user input to prevent the inputting of bad data
    Use defensive coding techniques to handle user input

IN THIS COURSE

  • 5m 30s
    In this video, you will identify potential risks to C# UI applications and how to mitigate them. FREE ACCESS
  • 4m 53s
    Upon completion of this video, you will be able to describe what buffer overflows are and how to limit their impact. FREE ACCESS
  • Locked
    3.  Preventing Buffer Overflows
    5m 45s
    After completing this video, you will be able to recall how to prevent buffer overflows in C# applications. FREE ACCESS
  • Locked
    4.  Code Injection Attacks
    4m 33s
    After completing this video, you will be able to describe what code injection attacks are and how to mitigate them in C# applications. FREE ACCESS
  • Locked
    5.  Formatted String Attacks
    4m 46s
    In this video, you will learn how to prevent formatted string vulnerabilities. FREE ACCESS
  • Locked
    6.  Preventing DLL Highjacking
    3m 56s
    After completing this video, you will be able to recognize how to prevent DLL hijacking in C# applications. FREE ACCESS
  • Locked
    7.  Using Exceptions
    5m 13s
    In this video, you will learn how to use exceptions in C# applications. FREE ACCESS
  • Locked
    8.  Dealing with Bad Data
    5m 44s
    After completing this video, you will be able to specify how to handle bad data in your C# applications. FREE ACCESS
  • Locked
    9.  Using Regular Expressions
    7m 30s
    In this video, you will learn how to work with regular expressions to help with input validation. FREE ACCESS
  • Locked
    10.  Constraining User Input
    6m 33s
    Upon completion of this video, you will be able to recognize how to constrain user input to prevent the inputting of bad data. FREE ACCESS
  • Locked
    11.  Exercise: Creating Code for Safe User Input
    4m 15s
    During this video, you will learn how to use defensive coding techniques to handle user input. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.6 of 344 users Rating 4.6 of 344 users (344)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 167 users Rating 4.4 of 167 users (167)
Rating 4.4 of 58 users Rating 4.4 of 58 users (58)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)