Your browser does not support this video.
OWASP, Part 2 of 4: Forgery and Phishing
with expert Mike Benkovich
In this course you’ll look at building secure applications from the mindset of the hacker and what a developer can do to avoid the front pages of the latest exploit. You will see examples of Cross-Site Forgery, how a phishing email works, the vulnerabilities of open source components, and also redirects from unvalidated links.
Intermediate | 0h 40m | October 05, 2015Course Outline
Mike Benkovich delivers technical presentations around the U.S. as a consultant, trainer, and former Developer Evangelist for Microsoft. He has worked in a variety of professional roles including architect, project manager, developer, and technical writer. Mike is also an author of two books, published by WROX Press and APress, that show developers how to get the most from their SQL databases. Since appearing in the 1994 Microsoft DevCast, Mike has presented technical information at seminars, conferences, and corporate boardrooms across America.