OWASP, Part 1 of 4: Avoiding Hacker Tricks

with expert Mike Benkovich

Writing secure applications in today's environment means we need to take our coding skills and approach up to a whole new level. Hackers are finding new ways to exploit us in ways that we used to think were safe. In this course we look at building secure applications from the mindset of the hacker, and what a developer can do to avoid the front pages of the latest exploit. We go thru secure coding principles and tools you can use to uncover attack vectors, look at patterns for reducing our risk, and the explore some top exploits that hackers use to steal our data.

Intermediate | 1h 24m | November 10, 2014

Web DevelopmentHTMLC#OWASPSecurity

Course Outline

Mike Benkovich

Mike Benkovich delivers technical presentations around the U.S. as a consultant, trainer, and former Developer Evangelist for Microsoft. He has worked in a variety of professional roles including architect, project manager, developer, and technical writer. Mike is also an author of two books, published by WROX Press and APress, that show developers how to get the most from their SQL databases. Since appearing in the 1994 Microsoft DevCast, Mike has presented technical information at seminars, conferences, and corporate boardrooms across America.

Explore Our Blogs, Courses and Webinars