Video description
Unless you try to exploit a vulnerability yourself, no reading will give you the required know-how to fully understand the impact and avoid such weaknesses in your applications.
To become a better professional, you should have a great understanding of the most critical web application security risks. This is mandatory for IT students, job seekers, software developers, testers, and application managers.
The OWASP Top 10 “is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.”
This course follows a hands-on approach: you’ll exploit at least 10 vulnerabilities in a deliberately vulnerable web application. In each session, we will review and briefly discuss a single OWASP Top 10 risk and then you’ll be guided to search and exploit that weakness in the target application. Since you’ll have access to the web application source code, you’ll be able to spot the vulnerable source code and fix it.
After completing this course, you’ll be comfortable answering security-related questions in your next job interview or bring security into your organization and into the Software Development Life Cycle (SDLC).
Table of contents
- Chapter 1: World Wide Web Fundamentals
- Chapter 2: Injection Flaws
- Chapter 3: Broken Authentication
- Chapter 4: Sensitive Data Exposure
- Chapter 5: XML External Entities (XXE)
- Chapter 6: Broken Access Control
- Chapter 7: Security Misconfiguration
- Chapter 8: Cross-Site Scripting (XSS)
- Chapter 9: Insecure Deserialization
- Chapter 10: Using Components with Known Vulnerabilities
- Chapter 11: Insufficient Logging Monitoring
Product information
- Title: OWASP Top 10 Security Fundamentals
- Author(s):
- Release date: August 2020
- Publisher(s): EC-Council
- ISBN: None
You might also like
video
Application Security - A complete guide
Every company uses software to function. From Fortune 500 technology companies to sole-proprietor landscaping firms, software …
book
Web Application Security, 2nd Edition
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of …
video
AWS Certified Security - Specialty
Enable security as part of your AWS architecture and prepare your response to security events like …
video
AWS Certified Security - Specialty
6 Hours of Video Instruction Description Six hours of video instruction for AWS security professionals. The …