Skip to content

Lesson 14 Using EJS in a Database Application

John R. McGarvey edited this page Apr 12, 2024 · 2 revisions

Lesson Page

In this lesson, the first step is to fix the security. In particular, the Cross Site Request Forgery attack is demonstrated, and then the student is given instructions on how to defend against the attack. The other standard packages for security protections are added.

CRUD operations for managed data are added. The sample solution uses the Job model, but students may elect to use the data model they created for lessons 9 through 11 instead.