Oreilly - OWASP: Threats Fundamentals
by Integrity Training | Publisher: Stone River eLearning | Release Date: June 2019 | ISBN: 300000006CA302
The OWASP: Threats Fundamentals course is part of a series of training courses on the Open Web Application Security Project (OWASP). This course covers the fundamental concepts and techniques to identify different types of threats. The course also teaches the students to improve the security by avoiding misconfigurations, data exposure and insecure cryptography. The OWASP Foundation was established with a purpose to secure the applications in such a way that they can be conceived, developed, acquired, operated, and maintained in a trusted way. All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. This course along with the other courses in the series on OWASP provides a basic overview of the concepts that form an integral part of the OWASP core values.
- Chapter 01 - Understanding Threats
- Topic A: OWASP Overview - Part 1 00:01:37
- OWASP Overview - Part 2 00:07:24
- OWASP Overview - Part 3 00:00:28
- Topic B: Top Ten Threats - Part 1 00:00:31
- Top Ten Threats - Part 2 00:25:13
- Top Ten Threats - Part 3 00:01:27
- Chapter 02 - Session Security
- Topic A: Authentication and Session Threats - Part 1 00:02:40
- Authentication and Session Threats - Part 2 00:27:30
- Authentication and Session Threats - Part 3 00:00:24
- Topic B: Threat Examples - Part 1 00:00:30
- Threat Examples - Part 2 00:29:33
- Threat Examples - Part 3 00:00:31
- Chapter 03 - Security Misconfiguration
- Topic A: Security Misconfiguration - Part 1 00:00:52
- Security Misconfiguration - Part 2 00:19:24
- Security Misconfiguration - Part 3 00:00:29
- Topic B: Misconfiguration Examples - Part 1 00:00:38
- Misconfiguration Examples - Part 2 00:27:46
- Misconfiguration Examples - Part 3 00:00:49
- Chapter 04 - Data Exposure and Cryptography
- Topic A: Sensitive Data Exposure - Part 1 00:01:15
- Sensitive Data Exposure - Part 2 00:29:46
- Sensitive Data Exposure - Part 3 00:00:42
- Topic B: Insecure Cryptographic Storage - Part 1 00:00:51
- Insecure Cryptographic Storage - Part 2 00:25:19
- Insecure Cryptographic Storage - Part 3 00:00:46
- Topic C: Function Level Access Control - Part 1 00:00:54
- Function Level Access Control - Part 2 00:16:32
- Function Level Access Control - Part 3 00:00:26
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.