We will begin this course by showing you the OWASP top 10 proactive controls, its history, and how to find the project on the OWASP website. We will discuss how to verify security, parameterized queries, encode data, and validate inputs. Here, we will also show you how to implement identity and authentication controls, including session management, federation, password management tools, and identity repositories.
We will then learn how to implement access tools and protect data. We will discuss logging and intrusion detection, which includes tips on proper application logging and suggestions on how to implement intrusion detection into your source code.
We will conclude with security frameworks and exception handling, such as leveraging security frameworks and libraries. You will also learn best practices in error and exception handling, especially exiting out of error conditions in a secure way.