Defensive Coding for JavaScript and HTML5
Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level
Overview/Description
Defensive Programming is a methodology for writing code that is not prone to present or future errors potentially caused by unexpected user inputs or actions. In this course, you will explore potential risks in web applications and use JavaScript defensive techniques to prevent everything from Document Object Model or DOM manipulation to ensuring proper encoding. You'll also learn about JavaScript Object Notation and how to secure it, as well as how to apply defensive coding to HTML5.
Target Audience
Developers seeking an introductory guide to developing efficient, secure applications that are defendable against a variety of issues
Prerequisites
None
Expected Duration (hours)
1.2
Lesson Objectives Defensive Coding for JavaScript and HTML5
start the course
list potential Document Object Model or DOM risks to JavaScript and HTML5 applications
describe the risks associated with cross-site scripting and cross-site request forgery
identify what Document Object Model or DOM-based Cross-Site Scripting or XSS is and illustrate the form an attack might take in JavaScript
describe what social jacking is and identify what things users need to be on the lookout for
list potential information and trust issues that would affect JavaScript and HTML5 applications
demonstrate how to prevent Document Object Model or DOM manipulation in JavaScript
describe common risks associated with third-party application program interfaces or APIs
demonstrate how to prevent page manipulation in JavaScript through cascading style sheets or CSS
identify the best practices for dealing with client input in a JavaScript HTML5 application
troubleshoot potential risks associated with browser plugins
demonstrate how to counteract risks by running JavaScript in a sandbox
compare Scalable Vector Graphics or SVG exploits and how to use JavaScript to prevent them
describe how to secure JavaScript code in your applications
describe the key features of JavaScript Object Notation
list the key risks of using JavaScript Object Notation
perform input validation on JavaScript Object Notation or JSON data
use the eval method to convert JavaScript Object Notation or JSON data into a JavaScript object
describe how to implement a cross-origin resource sharing policy in HTML5
demonstrate the most secure ways to include media in HTML5 pages
describe secure practices for using HTML5 Web Workers
distinguish some of the key ways to secure HTML5 applications
use defensive coding techniques to create a secure JavaScript and HTML5 Application
Course Number: sd_dpjh_a02_it_enus
Expertise Level
Intermediate