jagomart
digital resources
picture1_Cobol Pdf 188465 | Cbl101 Defending Cobol


 177x       Filetype PDF       File size 0.27 MB       Source: www.securitycompass.com


File: Cobol Pdf 188465 | Cbl101 Defending Cobol
cbl101 defending cobol course learning objectives learn about how the condentiality integrity and availability of your cobol applications are aected by vulnerabilities such as injection attacks column truncation broken access ...

icon picture PDF Filetype PDF | Posted on 02 Feb 2023 | 2 years ago
Partial capture of text on file.
      CBL101 – DEFENDING COBOL
        Course Learning Objectives
          Learn about how the confidentiality, integrity, and availability of your COBOL applications are affected by 
          vulnerabilities such as injection attacks, column truncation, broken access control, logic errors, bypassed 
          audit trails, debug code, and unsafe functions.
        Description
          This course is designed as an introduction to safeguarding mainframes that use the COBOL programming 
          language. 
          While COBOL implementations may vary extensively based on their platforms and environments, this 
          course aims to provide an implementation-agnostic overview of COBOL's most common vulnerabilities. 
            Audience                                  Time Required
                     Developers                                Tailored learning - 30 minutes total
                                                                                      COPYRIGHT 2019
       CBL101 – DEFENDING COBOL
         Course Outline
            
         1. Secure Coding - Part 1           2. Secure Coding - Part 2
         • Reducing the risk                 • Logic errors
         • CIA Triad                         • Bypassing audit trails
         • The COBOL language                • Debugging in production code
         • COBOL program structure           • Segregation of privilege
         • Common vulnerabilities in COBOL   • Static analysis tools 
         • SQL injection                     • Unsafe functions
         • Command injection                 • Analyzing COBOL programs
         • Column truncation
         • Broken access control
                                                                                                   COPYRIGHT 2019
The words contained in this file might help you see if this file matches what you are looking for:

...Cbl defending cobol course learning objectives learn about how the condentiality integrity and availability of your applications are aected by vulnerabilities such as injection attacks column truncation broken access control logic errors bypassed audit trails debug code unsafe functions description this is designed an introduction to safeguarding mainframes that use programming language while implementations may vary extensively based on their platforms environments aims provide implementation agnostic overview s most common audience time required developers tailored minutes total copyright outline secure coding part reducing risk cia triad bypassing debugging in production program structure segregation privilege static analysis tools sql command analyzing programs...

no reviews yet
Please Login to review.