• 10 hours
  • Medium

Free online content available in this course.

course.header.alt.is_video

course.header.alt.is_certifying

Got it!

Last updated on 4/2/20

Apply advanced strategies to maintaining your application's security

Evaluated skills

  • Apply advanced strategies to maintaining your application's security
  • Question 1

    How is security compliance verified?

    • An application that follows OWASP standards is automatically considered security compliant.

    • A third party vendor is required to certify a web application as security compliant.

    • Only a CTO can verify security compliance.

    • The lead back-end developer on a project must test the application for compliance.

  • Question 2

    If a web application is designed from the start to be OWASP compliant, is there any reason to be concerned with the application's security?

    Careful, there are several correct answers.
    • No, because OWASP is the most comprehensive standard for web security.

    • Yes, because new vulnerabilities can arise with modifications to the application.

    • Yes, because new vulnerabilities can arise as threats to web security evolve.

    • Yes, if stricter regulations like HIPAA or PCI DSS apply to the application or your business.

  • Question 3

    In which of the following ways does peach fuzzing, or testing random inputs on your web application, help your application?

    Careful, there are several correct answers.
    • It automates the line-by-line analysis of your code for vulnerabilities.

    • It helps you beat SQL injection and XSS attacks.

    • It checks your app's resilience against the dark web.

    • It ensures that proper validation techniques are used.

Ever considered an OpenClassrooms diploma?
  • Up to 100% of your training program funded
  • Flexible start date
  • Career-focused projects
  • Individual mentoring
Find the training program and funding option that suits you best