sponsored by Klocwork
Premiered:  Nov 13, 2013
Format:  Multimedia
Type:  Webcast
Language:  English
ABSTRACT:

In this course, we will look at CWE-129, which discusses weaknesses caused by improper validation of array indices.

This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.

At the end of this course, you will be able to:

  • Describe the improper validation of array index vulnerability.
  • Explain the security impact of the improper validation of array index vulnerability.
  • Describe the technical aspects of the improper validation of array index vulnerability, with examples.
  • Describe the remediation strategies to mitigate the problems described by CWE-129.





BROWSE RELATED WEBCASTS
Application Development | Application Life-Cycle Management | Application Security | Code Management | Programming | Programming Languages

View All Resources sponsored by Klocwork

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement