->

Owasp Top10 2021 Web Application Security Made Simple

Published 2/2023MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 2.42 GB | Duration: 2h 30m


 

An introduction to the OWASP Top 10 risks, attacks and how to mitigate them.

What you'll learn

Understanding of the OWASP organization and their Top10 List

How to identify attacks by their category

How to mitigate vulnerabilities in the OWASP Top10

How to improve your organization to address these known vulnerabilities earlier

Requirements

Interest in understanding of security concepts

No coding or programming experience needed

Open mind and a willingness to learn application security

Description

The OWASP Top 10 is the go-to document on application security awareness. This cours features the OWASP Top 10 2021 version explained with examples. Boost your DevSecOps and improve your threat hunting capabilities based on the findings from the OWASP community. However, use the OWASP Top 10 wisely. Although packed with useful information, the OWASP Top 10 is not a substitute for application security testing techniques or managed detection and response services. Instead, use the OWASP Top 10 in conjunction with professional cyber security protocols to get the best out of your application security. Within a few hours, you will be able to explain web application security without having to code. For your convenience:I will teach you the 10 most common risks and vulnerabilities identified by the Open Web Application Security Project (OWASP). This course will give your coding and testing a huge security head start!Overview1) Understand the OWASP top 10,2) Learn how each risk is attacked by hackers and pentesters, 3) Explain how these security threats can be mitigatedContentBroken Access ControlCryptographic FailuresInjectionInsecure DesignSecurity MisconfigurationVulnerable and Outdated ComponentsIdentification and Authentication FailuresSoftware and Data Integrity FailuresSecurity Logging and Monitoring FailuresServer-Side Request ForgeryI'm so excited to be able to share my experiences with you within InfoSec and Application Security.Enroll now, and I promise to help you on your Web Application Security journey!Cheers,Andy

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 What is OWASP?

Lecture 3 What is OWASP Top10?

Lecture 4 Tools to follow along

Section 2: The List

Lecture 5 Broken Access Control

Lecture 6 Cryptographic Failures

Lecture 7 Injection

Lecture 8 Insecure Design

Lecture 9 Security Misconfiguration

Lecture 10 Vulnerable and Outdated Components

Lecture 11 Identification and Authentication Failures

Lecture 12 Software and Data Integrity Failures

Lecture 13 Security Logging and Monitoring Failures

Lecture 14 Server-Side Request Forgery (SSRF)

Section 3: Wrap Up

Lecture 15 Shift-Left & DevSecOps

Lecture 16 Thank you

(Project) managers that lead software projects,Software architects that want to explain the OWASP top 10 to product owners,Software eeers that want to advance their career,Anyone interested in the basics of web application security, explained in layman’s terms,Pentesters / Red team that need foundational understanding,Recruiters that want to challenge software eeers,Product Owners that care about their product

HomePage:

https://www.udemy.com/course/owasp-top10-2021/

 

 

 


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Themelli   |  

Information
Members of Guests cannot leave comments.




rss