From the course: CertNexus Cyber Secure Coder (CSC-110) Cert Prep
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
Challenge: Identity requirements
From the course: CertNexus Cyber Secure Coder (CSC-110) Cert Prep
Challenge: Identity requirements
(upbeat music) - No, don't adjust your sets. I know this is a little bit different than if you're watching things in order here. Wait a minute, where's Daniel, what's going on? And in this course, there's going to be these little excerpts where I give you an assignment, go away try, and in the follow-up episode, we'll actually go through them together. Now why am I doing this? You should take some time to think about, well, how do I accomplish X and engage it? Now I don't care if you get it right or wrong, a lot of times, there's not right or wrong answers. But it's about tumbling around with that idea. Now with that said, let me give you your assignment. If we take a look at my screen here, part of this identifying security requirements and some user expectations. I will forewarn you that there are some user stories about this application that maybe you could misconstrue as expectations. But I want to drill down…
Contents
-
-
-
Prior knowledge and expectations4m 50s
-
(Locked)
Gather software requirements13m 17s
-
(Locked)
Challenge: Identity requirements2m 6s
-
(Locked)
Solution: Identify requirements8m 18s
-
(Locked)
Factors that undermine software security10m 39s
-
(Locked)
Software vulnerabilities and attack phases9m 38s
-
(Locked)
Attack patterns19m 18s
-
(Locked)
Challenge: Find vulnerabilities3m 8s
-
(Locked)
Solution: Find vulnerabilities10m 18s
-
(Locked)
Challenge: New password requirements3m 12s
-
(Locked)
Solution: New password requirements9m 22s
-
(Locked)
Challenge: Hashing passwords3m 42s
-
(Locked)
Solution: Hashing passwords19m 1s
-
(Locked)
Vulnerability intelligence13m 13s
-
(Locked)
Challenge: Vulnerability search4m 2s
-
(Locked)
Solution: Vulnerability search15m 31s
-
-
-
-
-
-