Securing C# Applications

  • 11 Videos | 1h 3m 37s
  • Includes Assessment
  • Earns a Badge
Likes 7 Likes 7
Discover how to protect your applications from attacks and bad data! During this course, you'll learn how to identify and defend your C#+ applications from potential risks and control user input to reduce the possibility of bad data entry. Topics include how to address potential UI application risks, such as buffer overflows, code injection attacks, formatted string attacks, and DLL hijacks. Next, specify how to handle bad data in your C# applications, and learn how to constrain user input to keep out malicious entries that can break your code. From there, you will learn how to validate user input through regular expressions, and write effective exception handlers. Finally, as a review exercise, you will create a C#/ASP.NET application that runs a contact page that applies defensive code and requires validated user input.

WHAT YOU WILL LEARN

  • identify potential risks to C# UI applications
    describe what buffer overflows are and how to limit their impact
    recall how to prevent buffer overflows in C# applications
    describe what code injection attacks are and how to mitigate them in C# applications
    identify how to prevent formatted string vulnerabilities
    recognize how to prevent DLL hijacking in C# applications
  • use exceptions in C# applications
    specify how to handle bad data in your C# applications
    work with regular expressions to help with input validation
    recognize how to constrain user input to prevent the inputting of bad data
    use defensive coding techniques to handle user input

IN THIS COURSE

  • Playable
    1. 
    Potential UI Application Risks
    5m 30s
    UP NEXT
  • Playable
    2. 
    Buffer Overflows in Applications
    4m 53s
  • Locked
    3. 
    Preventing Buffer Overflows
    5m 45s
  • Locked
    4. 
    Code Injection Attacks
    4m 33s
  • Locked
    5. 
    Formatted String Attacks
    4m 46s
  • Locked
    6. 
    Preventing DLL Highjacking
    3m 56s
  • Locked
    7. 
    Using Exceptions
    5m 13s
  • Locked
    8. 
    Dealing with Bad Data
    5m 44s
  • Locked
    9. 
    Using Regular Expressions
    7m 30s
  • Locked
    10. 
    Constraining User Input
    6m 33s
  • Locked
    11. 
    Exercise: Creating Code for Safe User Input
    4m 15s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 2 Likes 2  
Likes 10 Likes 10  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 10 Likes 10  
Likes 132 Likes 132  
Likes 23 Likes 23