Course Overview
Learning Objectives
- Learn to execute bug hunting and hacking activities in a manner that respects privacy and system integrity.
- Develop the ability to recognize and effectively utilize defect/bug reporting systems within your organization.
- Gain insights into common mistakes made during bug hunting and vulnerability testing and learn strategies to avoid them.
- Delve into the principles and terminology of defensive coding, including understanding the phases and objectives of a typical exploit, to build more secure applications.
- Recognize the value of a layered, in-depth defense strategy in cybersecurity, enhancing your capacity to build robust and resilient systems.
- Understand the potential origins of untrusted data and the risks they pose.
- Learn about the vulnerabilities associated with authentication and authorization, and how to detect, attack, and implement defenses.
- Familiarize yourself with the risks involved in XML processing, file uploads, and server-side interpreters, and learn how to mitigate these risks.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):