Heads up! To view this whole video, sign in with your Courses account or enroll in your free 7-day trial. Sign In Enroll
Well done!
You have completed Introduction to Application Security!
You have completed Introduction to Application Security!
Now that we have covered the basics of web security, keep all these principles and points in mind when developing web apps and securing existing web apps, and always be curious to learn more about what it takes to be secure.
Practice
Further Reading
Vulnerable VMs:
- Web Dojo, which has many vulnerable applications and their docs included: Web Security Dojo
- Google Gruyere, by Bruce Leban, Mugdha Bendre, and Parisa Tabriz, another vulnerable web application, which you can do online without installing a VM: Web Application Exploits and Defenses
Security challenges: Websites with online challenges to hack into apps, exploit JavaScript, and break cryptography problems:
https://www.hackthissite.org/
https://overthewire.org/wargames/
Related Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign upRelated Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign up
You need to sign up for Treehouse in order to download course files.
Sign upYou need to sign up for Treehouse in order to set up Workspace
Sign up