From the course: CertNexus Cyber Secure Coder (CSC-110) Cert Prep
Unlock this course with a free trial
Join today to access over 24,800 courses taught by industry experts.
Challenge: Exploring leftover artifacts
From the course: CertNexus Cyber Secure Coder (CSC-110) Cert Prep
Challenge: Exploring leftover artifacts
(upbeat music) - Well I'm glad you stuck around, because that's been a little bit high on the uptake side, it's probably time for you to do something so you can see why I'm so emphatic on, considering human elements and also planning, having processes. Now with that said if we take a look at my screen, you'll have access to this application and this application is, think of it as it's residing on a server somewhere, it's actually running, and there may be times where we spin it up but right now this is live. This is production, Woodworker's Wheelhouse. And part of that, and I've done it, is I have to FTP things and here's an FTP directory. That FTP directory is just where you put things, right? Now what I want you to do is I want you to just start poking around in this FTP directory and see what is possibly left over. I brought this over, I used it for something, I forgot to clean up after myself, but now other…
Contents
-
-
-
-
Bugs in software14m 11s
-
(Locked)
External libraries and services16m 44s
-
(Locked)
Handling errors securely17m 28s
-
(Locked)
Human-related security15m 39s
-
(Locked)
Security requirements and design10m 34s
-
(Locked)
Security through the software lifecycle17m
-
(Locked)
Challenge: Exploring leftover artifacts2m 7s
-
(Locked)
Solution: Exploring leftover artifacts14m 1s
-
-
-
-
-