
SDT 323 – Improper Input Validation (NEW)

COURSE OVERVIEW
Input validation is used to check potentially dangerous inputs but when software does not validate this input properly, an attacker is able to craft the input in a form that is not expected by the rest of the application. This course introduces ways to identify and mitigate this security weakness, referenced as CWE-20 by the 2020 CWE Top 25
Topics include:
- Identifying malicious input
- Recognizing the impact of this vulnerability
- Strategies for defending against Improper Input Validation
- Testing for Improper Input Validation weaknesses
Course Duration : 10 mins
COURSE OVERVIEW
Input validation is used to check potentially dangerous inputs but when software does not validate this input properly, an attacker is able to craft the input in a form that is not expected by the rest of the application. This course introduces ways to identify and mitigate this security weakness, referenced as CWE-20 by the 2020 CWE Top 25
Topics include:
- Identifying malicious input
- Recognizing the impact of this vulnerability
- Strategies for defending against Improper Input Validation
- Testing for Improper Input Validation weaknesses
Course Duration : 10 mins