Foundational JavaScript Security

Foundational JavaScript Security

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 0h 47m | 168 MB

JavaScript offers great power, but also many opportunities to leave doors open to hackers. Ethical hacking lets you find those open doors before they can be exploited and ensure that your sites and applications stay standing. This course shows how to improve security on your JavaScript projects using a wide variety of testing tools that provide maximum coverage. Emmanuel Henri starts by showing how to plan your strategy and set up the project in this course. He then shows how to perform reconnaissance using Snyk, GitHub Dependabot, and AppSensor. He also reviews the top eight security threats to JavaScript apps and websites, including injection, insecure deserialization, and insufficient logging. Finally, he shows how to close these loopholes in hands-on exercises. Make sure to take the challenges issued along the way to test your JavaScript security prowess.

Table of Contents

Introduction
1 Foundational JavaScript security
2 What you should know

1. Introduction and Setup
3 What is ethical hacking
4 Overview of cyber kill chain
5 Plan an attack strategy
6 Base project setup
7 Challenge What is ethical hacking
8 Solution What is ethical hacking

2. Reconnaissance
9 Reconnaissance introduction
10 Introduction and setup for Snyk
11 Introduction to GitHub Dependabot
12 Introduction to AppSensor
13 Reconnaissance applied to project
14 Challenge What is the purpose of reconnaissance
15 Solution What is the purpose of reconnaissance

3. Top Security Threats
16 Solution What is the best resource for top threats
17 Injection threat
18 Broken authentication
19 Sensitive data
20 XML external entities
21 Security misconfiguration
22 Insecure deserialization
23 Components with known vulnerabilities
24 Insufficient logging and monitoring
25 Challenge What is the best resource for top threats

4. Security Threats Applied
26 Injection threat resources
27 Broken authentication resources
28 Sensitive data exposure resources
29 XML external entities resources
30 Security misconfiguration resources
31 Secure deserialization resources
32 Challenge What is secured deserialization
33 Solution What is secured deserialization

Conclusion
34 Next steps

Homepage