Code-Data Separation Course

Take a look at ensuring segregation of trusted and untrusted items.

1 hour, 2 minutes

Course description

This course covers the separation of our code and data to prevent some of the most common types of attacks. These include SQL injection, XSS, CSRF, data leaks and source disclosure.

Syllabus

Application Settings and Secrets

Video - 00:21:00

Explore best practices for storing and using application settings.
Data Leaks and Source Disclosure

Video - 00:09:00

How to prevent revealing secure information.
XSS and CSRF

Video - 00:16:00

Defending against common spoofing attacks.
SQL Injection

Video - 00:17:00

Using secure database interactions to prevent attacks.

Meet the author

David Myers

David Myers is a senior full-stack software engineer specializing in the development of complex web applications, with over 18 years of experience developing for the web. He primarily works within the LAMP stack of technologies but often utilizes whatever technology is needed. This includes Nginx, Python and Redis when discussing back-end technologies and ES6, Typescript, jQuery and Angular for front-end technologies. He has a broad range of experience working with clients and companies across many different industries.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • Cyber Operator
  • Law Enforcement / Counterintelligence Forensics Analyst
  • Cyber Defense Forensics Analyst

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust