Every registration supports local education. TrainUp Gives Back

Your Career Training Marketplace

Questions? Call Toll-Free: 1-866-540-9677

  • Instant Access ImageInstant Access
    From Anywhere
  • Unlimited Viewing ImageUnlimited
  • calendar Image 6-12 Months
    To Complete


Defensive Programming is a methodology for writing code that is not prone to present or future errors potentially caused by unexpected user inputs or actions. In this course, you will explore potential risks in web applications and use JavaScript defensive techniques to prevent everything from Document Object Model or DOM manipulation to ensuring proper encoding. You'll also learn about JavaScript Object Notation and how to secure it, as well as how to apply defensive coding to HTML5.

Learning Objectives
  • Start the course
  • List potential Document Object Model or DOM risks to JavaScript and HTML5 applications
  • Describe the risks associated with cross-site scripting and cross-site request forgery
  • Identify what Document Object Model or DOM-based Cross-Site Scripting or XSS is and illustrate the form an attack might take in JavaScript
  • Describe what social jacking is and identify what things users need to be on the lookout for
  • List potential information and trust issues that would affect JavaScript and HTML5 applications
  • Demonstrate how to prevent Document Object Model or DOM manipulation in JavaScript
  • Describe common risks associated with third-party application program interfaces or APIs
  • Demonstrate how to prevent page manipulation in JavaScript through cascading style sheets or CSS
  • Identify the best practices for dealing with client input in a JavaScript HTML5 application
  • Troubleshoot potential risks associated with browser plugins
  • Demonstrate how to counteract risks by running JavaScript in a sandbox
  • Compare Scalable Vector Graphics or SVG exploits and how to use JavaScript to prevent them
  • Describe how to secure JavaScript code in your applications
  • Describe the key features of JavaScript Object Notation
  • List the key risks of using JavaScript Object Notation
  • Perform input validation on JavaScript Object Notation or JSON data
  • Use the eval method to convert JavaScript Object Notation or JSON data into a JavaScript object
  • Describe how to implement a cross-origin resource sharing policy in HTML5
  • Demonstrate the most secure ways to include media in HTML5 pages
  • Describe secure practices for using HTML5 Web Workers
  • Distinguish some of the key ways to secure HTML5 applications
  • Use defensive coding techniques to create a secure JavaScript and HTML5 Application
  • Audience

Get the latest industry news, recommended courses, & promotions from TrainUp.com sent straight to your inbox.