1 00:00:00,000 --> 00:00:02,870 Welcome to application security. 2 00:00:02,870 --> 00:00:04,066 In this section of the course, 3 00:00:04,066 --> 00:00:06,972 we are going to move up into the software realm 4 00:00:06,972 --> 00:00:09,131 and start looking at the different applications 5 00:00:09,131 --> 00:00:11,611 that are used on our desktop devices. 6 00:00:11,611 --> 00:00:15,160 These applications bring to us a world of functionality, 7 00:00:15,160 --> 00:00:16,910 whether that's browsing the Internet, 8 00:00:16,910 --> 00:00:19,780 conducting productivity by creating Word documents 9 00:00:19,780 --> 00:00:23,373 and spreadsheets, or by doing a host of other things. 10 00:00:23,373 --> 00:00:25,899 But each piece of software does introduce 11 00:00:25,899 --> 00:00:28,310 additional vulnerabilities to our system, 12 00:00:28,310 --> 00:00:30,820 and we're going to talk about that throughout this section. 13 00:00:30,820 --> 00:00:33,457 First, we'll spend some time talking about web browsers. 14 00:00:33,457 --> 00:00:35,918 When we talk about web browsers, this is really important, 15 00:00:35,918 --> 00:00:38,779 because web browsers are a conduit to the Internet. 16 00:00:38,779 --> 00:00:40,267 That gives us a lot of capability, 17 00:00:40,267 --> 00:00:43,091 but it also brings a lot of vulnerability 18 00:00:43,091 --> 00:00:45,510 and all of those dangers from the Internet, 19 00:00:45,510 --> 00:00:48,525 such as malicious websites, web apps, and more. 20 00:00:48,525 --> 00:00:50,296 As we go through this section, we're going to cover 21 00:00:50,296 --> 00:00:52,899 the various different types of web browsers that are used, 22 00:00:52,899 --> 00:00:55,549 how we can best secure them, and any other concerns 23 00:00:55,549 --> 00:00:57,220 that we should be thinking about 24 00:00:57,220 --> 00:00:59,170 as we're dealing with web browsers. 25 00:00:59,170 --> 00:01:01,339 Then we're going to get into the productivity space, 26 00:01:01,339 --> 00:01:03,839 and we're going to talk about the world's most popular 27 00:01:03,839 --> 00:01:06,059 productivity applications, specifically 28 00:01:06,059 --> 00:01:08,549 the Microsoft Office suite of tools. 29 00:01:08,549 --> 00:01:10,098 This includes things like word processing 30 00:01:10,098 --> 00:01:13,616 with Microsoft Word, spreadsheets with Microsoft Excel, 31 00:01:13,616 --> 00:01:17,310 and presentations using things like Microsoft PowerPoint. 32 00:01:17,310 --> 00:01:18,950 But we won't stop there. 33 00:01:18,950 --> 00:01:21,790 We'll move into the other category, which is going to cover 34 00:01:21,790 --> 00:01:23,739 all of the other applications out there. 35 00:01:23,739 --> 00:01:25,709 Now, obviously, we're not going to be able to cover 36 00:01:25,709 --> 00:01:28,128 each application in depth, but instead, 37 00:01:28,128 --> 00:01:30,850 we're going to talk about the best way to set up 38 00:01:30,850 --> 00:01:33,070 the right permissions and the right way to conduct 39 00:01:33,070 --> 00:01:34,640 application whitelisting and blacklisting 40 00:01:34,640 --> 00:01:36,731 to ensure that your computer is safe 41 00:01:36,731 --> 00:01:38,295 from the different types of software 42 00:01:38,295 --> 00:01:40,220 that you may wish to install. 43 00:01:40,220 --> 00:01:43,323 So, let's get started with application security.