SDT 316- Testing for Use of Hard-Coded Credentials (UPDATED)
COURSE OVERVIEW
Applications that use authentication need a method for storing credentials that is secure because when a hacker recovers credentials, they can use them to authenticate with the application or to access external services. This course introduces ways to identify and mitigate this security weakness, referenced as CWE-798 by the 2020 CWE Top 25.
Topics include:
- Recognizing the impact of this vulnerability
- Techniques for nding Hard-Coded credentials in source code
- Application of secure coding best practices to prevent these attacks
- Testing to detect this security weakness
Course Duration : 10 mins
COURSE OVERVIEW
Applications that use authentication need a method for storing credentials that is secure because when a hacker recovers credentials, they can use them to authenticate with the application or to access external services. This course introduces ways to identify and mitigate this security weakness, referenced as CWE-798 by the 2020 CWE Top 25.
Topics include:
- Recognizing the impact of this vulnerability
- Techniques for nding Hard-Coded credentials in source code
- Application of secure coding best practices to prevent these attacks
- Testing to detect this security weakness
Course Duration : 10 mins