Skip to content

Latest commit

 

History

History
37 lines (25 loc) · 2.15 KB

hackerdefense1.md

File metadata and controls

37 lines (25 loc) · 2.15 KB

Hacker Defense Apprentice 1

A developer who is able to create applications that are resistant to hacker attacks

Master the following skills:

  • Describe the processes of each of the security risks below
  • Describe common attacks that hackers can use for each security risk below
  • Demonstrate how to perform attacks using the security risks below
  • Demonstrate how to defend against attacks that exploit the security risks below

OWASP Security Risks:

  • Injection
  • Broken Authentication
  • Sensitive Data Exposure

Resources:

Evaluation:

Ask your mentor if you are ready for evaluation. Then, do one of the following:

  1. Schedule a live evaluation by clicking here to find a time on the calendar. After the evaluation, claim the badge.

or

  1. Record a screencast where you talk about and demonstrate each competency listed above. Make sure badge criteria and relevant tools are visible in the screen cast AND that your audio is good enough for the evaluator to hear. Upload the video to a service like Vimeo or Youtube (unlisted is fine) so that you can provide a public url for an evaluator to view. Claim the badge and include the video url in the evidence box.