Companies Home Search Profile

Secure Coding with OWASP in Go

Focused View

Paul Mooney

4:18:01

92 View
  • 1. Course Overview.mp4
    01:59
  • 1. The Fundamentals of Software Security.mp4
    03:16
  • 2. Web Security and Go.mp4
    01:38
  • 3. OWASP the Open Web Application Security Project and Go.mp4
    03:10
  • 4. The OWASP Top 10.mp4
    04:33
  • 5. Go and the OWASP Top 10 Proactive Controls.mp4
    00:53
  • 6. Mapping Security Requirements with the OWASP ASVS.mp4
    02:58
  • 7. Demo - Forking and Customizing the ASVS GitHub Repository.mp4
    03:23
  • 8. Summary.mp4
    02:02
  • 01. Overview.mp4
    01:31
  • 02. Whitelisting.mp4
    02:31
  • 03. Boundary Checking.mp4
    02:46
  • 04. Character Escaping.mp4
    01:58
  • 05. Numeric Validation.mp4
    01:21
  • 06. Checking for Null Bytes.mp4
    02:18
  • 07. Checking for Newline Characters.mp4
    02:45
  • 08. Checking for Path Alteration Characters.mp4
    02:17
  • 09. Checking for Extended Utf8 Encoding.mp4
    02:18
  • 10. Summary.mp4
    00:41
  • 1. Overview.mp4
    01:21
  • 2. An Intro to XSS.mp4
    02:00
  • 3. Types of XSS Attack.mp4
    03:20
  • 4. Demo - Preventing XSS Attacks with Output Encoding.mp4
    03:44
  • 5. SQL Injection.mp4
    05:49
  • 6. Summary.mp4
    00:49
  • 01. Overview.mp4
    00:35
  • 02. Introduction to Authentication.mp4
    00:39
  • 03. Types of Authentication.mp4
    01:21
  • 04. Common Authentication Protocols.mp4
    01:29
  • 05. Secure Communication Protocols.mp4
    01:36
  • 06. Password Security Best Practices.mp4
    01:29
  • 07. Password Storage Options.mp4
    01:33
  • 08. Demo - Single Factor Authentication.mp4
    03:56
  • 09. Password Policies.mp4
    02:21
  • 10. Password Reset Functionality.mp4
    01:59
  • 11. Demo - Multi Factor Authentication.mp4
    04:36
  • 12. Summary.mp4
    00:49
  • 1. Overview.mp4
    02:16
  • 2. Session Management Controls.mp4
    02:16
  • 3. Secure Session Identifiers.mp4
    02:15
  • 4. Session Integrity.mp4
    03:10
  • 5. Tokens and Logout.mp4
    01:44
  • 6. Demo - Secure Session Management.mp4
    06:32
  • 7. Summary.mp4
    02:05
  • 1. Overview.mp4
    02:00
  • 2. Files and Other Resources.mp4
    02:03
  • 3. Protected URLs.mp4
    02:13
  • 4. Protected Functions.mp4
    01:38
  • 5. Direct Object References.mp4
    01:57
  • 6. Services and Application Data.mp4
    01:20
  • 7. Data Attributes and Policy Information.mp4
    00:59
  • 8. Best Practices.mp4
    01:59
  • 9. Summary.mp4
    00:59
  • 1. Overview.mp4
    00:40
  • 2. Hashing.mp4
    01:49
  • 3. Demo - Hashing.mp4
    01:32
  • 4. Encryption.mp4
    03:24
  • 5. NaCL.mp4
    01:52
  • 6. Demo - Encryption.mp4
    01:52
  • 7. Cryptographic Practices.mp4
    01:22
  • 8. Summary.mp4
    01:31
  • 01. Overview.mp4
    01:22
  • 02. Error Handling.mp4
    00:59
  • 03. Effective Error Handling.mp4
    05:53
  • 04. Logging.mp4
    00:45
  • 05. Effective Logging.mp4
    02:11
  • 06. Logging Best Practices.mp4
    01:37
  • 07. Advanced Logging.mp4
    02:20
  • 08. More Best Practices.mp4
    02:21
  • 09. Ensuring Log File Integrity.mp4
    02:17
  • 10. Summary.mp4
    01:00
  • 1. Overview.mp4
    01:30
  • 2. Managing Sensitive Information.mp4
    01:38
  • 3. Scrubbing URLs.mp4
    03:09
  • 4. Information Is Power.mp4
    01:57
  • 5. Encryption Is the Key.mp4
    01:51
  • 6. Disable What You Dont Need.mp4
    01:33
  • 7. Cache Protection.mp4
    01:55
  • 8. Summary.mp4
    01:15
  • 1. Overview.mp4
    02:15
  • 2. HTTP TLS.mp4
    13:27
  • 3. Websockets.mp4
    09:08
  • 4. Summary.mp4
    01:58
  • 1. Overview.mp4
    01:41
  • 2. Demo - Directory Listings.mp4
    03:31
  • 3. Remove Disable What You Dont Need.mp4
    02:08
  • 4. Implement Better Security.mp4
    02:43
  • 5. Asset Management System.mp4
    01:17
  • 6. Summary.mp4
    01:34
  • 1. Overview.mp4
    02:38
  • 2. Best Practices.mp4
    01:55
  • 3. Database Authentication.mp4
    01:41
  • 4. Database Connections.mp4
    03:26
  • 5. Parameterised Queries.mp4
    02:19
  • 6. Stored Procedures.mp4
    02:00
  • 7. Summary.mp4
    01:05
  • 1. Overview.mp4
    02:38
  • 2. Best Practices.mp4
    01:55
  • 3. Database Authentication.mp4
    01:41
  • 4. Database Connections.mp4
    03:26
  • 5. Parameterised Queries.mp4
    02:19
  • 6. Stored Procedures.mp4
    02:00
  • 7. Summary.mp4
    01:05
  • 1. Overview.mp4
    02:18
  • 2. Memory Management.mp4
    02:20
  • 3. Cross-site Request Forgery.mp4
    08:41
  • 4. Regular Expressions.mp4
    04:17
  • 5. Summary.mp4
    01:50
  • Description


    Golang (Go) is used to build mission critical applications handling sensitive data. This course will teach you how to implement the most common security requirements and defenses recommended by OWASP in your Golong (Go) applications.

    What You'll Learn?


      Ready to become an expert in web security? In this course, Secure Coding with OWASP in Go, if you are an intermediate learner looking to master web security, you will learn advanced techniques that will enable you to implement military-grade security defenses in Golang (Go) web applications. First, you'll explore the core concepts behind web security, including the theory and architecture as defined by the OWASP community. Next, you'll also gain awareness of the OWASP Top Ten threats, and how to apply an appropriate level of coverage and rigor when it comes to performing web application security verification based on the ASVS (Application Security Verification Standard). Finally, you'll learn about the OWASP Top Ten Proactive controls, the concrete techniques used to defend web applications. By the end of this course, you'll have the skills and knowledge needed to understand the most advanced techniques used to implement sophisticated security frameworks in any Golang (Go) web application.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Paul is an accomplished cybersecurity expert known for building military-grade security systems and developing robust protection against malicious bots. As Chief Software Architect for a major US healthcare group, Paul excels in implementing secure solutions for critical environments. With his knowledge and hands-on experience, you will gain practical insights to construct cutting-edge security systems and defend against evolving cyber threats. By watching Paul's courses, you will acquire the skills needed to safeguard your web applications confidently. Join him on a journey and ensure digital fortification in today's dynamic cybersecurity landscape.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 108
    • duration 4:18:01
    • level average
    • English subtitles has
    • Release Date 2023/08/21

    Courses related to Programming Fundamentals

    Courses related to Object Oriented Programming

    Courses related to Go

    Courses related to Ethical Hacking

    Courses related to Cyber Security

    Courses related to Penetration Testing

    Courses related to Network Security

    Courses related to Information Security