Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Description
In this course, you’ll learn how about the most common attack now used to steal payment card data and the possible defences.
In this course, Defending Against JavaScript Keylogger Attacks on Payment Card Information, John Elliott and Troy Hunt discuss the most common attack used to steal payment card data and how to defend against it. Learn how security people think about a problem, why criminals attack, how their tools and techniques work, and how you have to adapt as defenders. By the end of this course, you’ll have a better understanding of the NIST model, how thinking about detection is equally important, and response/recovery.
Topics:
- Course Overview
- The Evolution of the Crime
- PROTECT: Employing JavaScript Security Techniques
- PROTECT: Preventing Webserver Compromise
- DETECT: ​Detecting Compromised JavaScript
- Response and Recovery
Tags
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/06cff272172a.jpg)
Defending Against JavaScript Keylogger Attacks on Payment Card Information
via Pluralsight
Affiliate notice
-
TypeOnline Course
-
Provider
In this course, you’ll learn how about the most common attack now used to steal payment card data and the possible defences.
In this course, Defending Against JavaScript Keylogger Attacks on Payment Card Information, John Elliott and Troy Hunt discuss the most common attack used to steal payment card data and how to defend against it. Learn how security people think about a problem, why criminals attack, how their tools and techniques work, and how you have to adapt as defenders. By the end of this course, you’ll have a better understanding of the NIST model, how thinking about detection is equally important, and response/recovery.
Topics:
In this course, Defending Against JavaScript Keylogger Attacks on Payment Card Information, John Elliott and Troy Hunt discuss the most common attack used to steal payment card data and how to defend against it. Learn how security people think about a problem, why criminals attack, how their tools and techniques work, and how you have to adapt as defenders. By the end of this course, you’ll have a better understanding of the NIST model, how thinking about detection is equally important, and response/recovery.
Topics:
- Course Overview
- The Evolution of the Crime
- PROTECT: Employing JavaScript Security Techniques
- PROTECT: Preventing Webserver Compromise
- DETECT: ​Detecting Compromised JavaScript
- Response and Recovery
Tags
Loading...
Saving...
Loading...