No rate limiting
Learn about the issues that arise in an application that employs no rate limiting techniques, as well as how you can go about implementing those protections.
Learn how an open redirect attack works, and how to mitigate and remediate the vulnerability with real-world examples from security experts.
Learn what an insecure hash is, why you should be aware of it, and how you can implement strong hashes to remediate the vulnerability in your organization.
Learn how to protect your code from directory traversal in Go by exploiting a vulnerable web server.
Learn how to protect your Go code from various forms of cross-site scripting (XSS) attacks.
Learn how to create SQL queries securely and avoid SQL injection attempts by malicious third parties.