Video description
Unless you try to exploit a vulnerability yourself, no reading will give you the required know-how to fully understand the impact and avoid such weaknesses in your applications.
To become a better professional, you should have a great understanding of the most critical web application security risks. This is mandatory for IT students, job seekers, software developers, testers, and application managers.
The OWASP Top 10 “is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.”
This course follows a hands-on approach: you’ll exploit at least 10 vulnerabilities in a deliberately vulnerable web application. In each session, we will review and briefly discuss a single OWASP Top 10 risk and then you’ll be guided to search and exploit that weakness in the target application. Since you’ll have access to the web application source code, you’ll be able to spot the vulnerable source code and fix it.
After completing this course, you’ll be comfortable answering security-related questions in your next job interview or bring security into your organization and into the Software Development Life Cycle (SDLC).
Table of contents
- Chapter 1: World Wide Web Fundamentals
- Chapter 2: Injection Flaws
- Chapter 3: Broken Authentication
- Chapter 4: Sensitive Data Exposure
- Chapter 5: XML External Entities (XXE)
- Chapter 6: Broken Access Control
- Chapter 7: Security Misconfiguration
- Chapter 8: Cross-Site Scripting (XSS)
- Chapter 9: Insecure Deserialization
- Chapter 10: Using Components with Known Vulnerabilities
- Chapter 11: Insufficient Logging Monitoring
Product information
- Title: OWASP Top 10 Security Fundamentals
- Author(s):
- Release date: August 2020
- Publisher(s): EC-Council
- ISBN: None
You might also like
video
AWS Certified Security - Specialty
6 Hours of Video Instruction Description Six hours of video instruction for AWS security professionals. The …
video
AWS Certified Security - Specialty
Enable security as part of your AWS architecture and prepare your response to security events like …
video
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
More than 25 Hours of Expert Video Instruction An updated edition of this video title is …
book
Certified Kubernetes Administrator (CKA) Study Guide
Exclusively on O'Reilly: Get more hands-on training and test your CKA exam readiness by working through …