CG数据库 >> How to Stop Man-in-the-Middle and Downgrade Attacks in Your Apps (2016)

How to Stop Man-in-the-Middle and Downgrade Attacks in Your Apps (2016)的图片1

How to Stop Man-in-the-Middle and Downgrade Attacks in Your Apps

August 2016 | MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | 326 MB

Genre: eLearning | Language: English

Securing communications over untrusted networks is a critical element of security for any modern application. In this course, you will learn how to simulate man-in-the-middle attacks to test for these problems, and learn how to prevent them.

While one of the cornerstones of application security is securing communications over untrusted networks, far too often developers and operations personnel get tripped up by the many pitfalls of implementation, often resulting in the complete failure to secure data on the wire. In this course, you'll learn how adversaries can gain access to other users' communications through a variety of techniques, and prevention strategies. The course covers specific topics ranging from the SSL/TLS certificate authority system, to secure web session management and mobile communications security. You'll also learn how to conduct simulated man-in-the-middle attacks to empirically test SSL/TLS certificate validation in realistic scenarios. By the end of this course, you'll have a thorough understanding of techniques to prevent interception and make applications more secure.

How to Stop Man-in-the-Middle and Downgrade Attacks in Your Apps (2016)的图片2

发布日期: 2016-08-20