From the course: Foundational JavaScript Security
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Challenge: What is the best resource for top threats? - JavaScript Tutorial
From the course: Foundational JavaScript Security
Challenge: What is the best resource for top threats?
(upbeat music begins) (upbeat music ends) - [Instructor] So before we keep going, let's challenge you with a quick question. In this chapter, we discussed the biggest threats in security, so here's the question: What is the best resource for getting more information on your top threats? Think about what you'd answer, and when you're ready, watch the solution video.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
(Locked)
Injection threat2m 21s
-
(Locked)
Broken authentication1m 57s
-
(Locked)
Sensitive data1m 5s
-
(Locked)
XML external entities1m 10s
-
(Locked)
Security misconfiguration1m 28s
-
(Locked)
Insecure deserialization1m 17s
-
(Locked)
Components with known vulnerabilities1m 2s
-
(Locked)
Insufficient logging and monitoring1m 37s
-
(Locked)
Challenge: What is the best resource for top threats?25s
-
(Locked)
Solution: What is the best resource for top threats?39s
-
(Locked)
-
-